Answer:
In footnotes, information is separated by commas, while in the bibliography, it is separated by periods.
In footnotes, the author's first name is listed first, while in the bibliography, the author's last name is listed first.
The titles of books and journals are put in italics.
The titles of articles are put in quotation marks.
All key words in titles are capitalized.
Explanation:
Answer:
The answer to this question is vulnerability and risk.
Explanation:
Vulnerability is there us misconfiguration in the system and we know that our system is vulnerable means the hacker can gain unauthorized access to our system.
Risk is when there are chances that a misconfiguration might happen in our system in future so that hacker could gain unauthorized access to the system.
Answer:
Source computer to the destination computer via one of more networks
Explanation:
The network layer provides the means of transferring variable-length network packets from a source to a destination host via one or more networks.