Answer:
Ask her to get a genuine software
Explanation:
if i will install, it can cause the following problems:
1. Prated software makes your system Vulnerable to the security attacks because the activities of the software are not monitored by any organization and no one is responsible for anything bad happened to your system.
2. It may stop working anytime because there would not be maintenance patches available for it so that it can work properly.
3. It cannot be updated and may cause problems in core functionalities of it.
4.Serious legal actions can be taken against anyone using them because economy has drastic decrease due ti use of it.
Answer:
The system’s non-user-specific configurations are stored in the HKEY_LO-
CAL_MACHINE root key of the Registry.
Explanation:
Answer:A) Syslog
Explanation: Syslog is the log for the messaging in the computing field.It acts as a separator for the different task that is related to messaging. The task usually are storing of message, production of the message through software,analyzing message, reporting it etc.
Other options given in the question such as WORM storage is for the storage technology,UTM is for the management for the threat situation and firewall logging is related with log/tables for firewall.
Thus, the correct option is option (A).
Answer:A password or a PIN
Explanation: Develetech is a industry that has the a internet page and can also be used in the mobile devices. There is particular authorization that the organization provides to an individual user for accessing of the services to maintain the security .The security is maintained by providing the devices with an encrypted text that is known as the password. The user has to enter the pin or password to execute the service on device.