Answer:
b. Customized auditing.
Explanation:
Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.
There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.
The credentialed scanning provides baseline and customised auditing features.
It is possible for the router to know whether it is supposed to send a cat photo to your laptop because It uses the private IP address.
Router is a device that help to transfer data and across the internet or across the user device and the internet.
Private IP addresses are internet protocol addresses that is often assign to user device by router in order to a successful communicate to take place between the internet and user device.
Private IP addresses are mostly at:
•Home
•Office
•Business environments
Inconclusion It is possible for the router to know whether it is supposed to send a cat photo to your laptop because It uses the private IP address.
Learn more here:
brainly.com/question/19112414
Answer:anti various
Explanation:hope fully this will help u
Answer:
A. a collection of organized data.
Explanation:
It can be a data source, or a database, an excel sheet. or access database. However, it must be well-formatted and hence organized. filtering of data is not necessary, as well as it is not any barrier to the number of the set of data, or the data being sorted. Unsorted data is also fine, and multiple set of data is also fine. It must be known that a data source can be formed from multiple sets of data through the query. And the resultant data source can be used by the mail merge. However, the data source must be a collection of organized data. Hence, A is the correct answer.