Answer:
A
Explanation:
A hacker searching for open ports denotes vulnerability of computer (to hacking).
Cheers
Answer: d. incremental backup
Explanation:
In incremental backup it copies only the files that have changed since the last full backup. It does not backup all the files just like the full backup. it however backup those copies into the system which has changed since the last backup.
In doing so it just increases the efficiency and performance of the backup procedure. This process is basically preferred when the amount of file to be backup is huge and there is not enough time to do a full backup.
Increment backup also use less disk space.
Cloud backup uses most increment backup for its application.
Answer:
Encryption used on hard drives
Explanation:
TPM is a hardware chip. It is a type of module that is used to authenticate the hardware devices with the help of encryption keys (passwords). It is the short form of Trusted Platform module. The hardware devices that be authenticated through this module may include personnel computer or laptops. There are different keys, password and security codes.
So, the best sentence that describes, TPM is Encryption built into hardware
.