Answer:
b. Customized auditing.
Explanation:
Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.
There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.
The credentialed scanning provides baseline and customised auditing features.
Answer:
5
Explanation:
2⁵ = 32, so that fits.
In general, to calculate the number of bits without guessing, you can take the 2 log of the number and then round up:
rounded up gives 5.
1. Cyberbullying
2.Confide in an adult you trust, such as a teacher or a parent
3.It is easy to miscommunicate and escalate the situation in an online environment
Cyberbully hurts people, so NEVER post something that could hurt someone's feelings
Hope this helps!