Answer:
D: The protocols of the Internet are open and used by all devices connected to the network
Explanation:
There are billions of devices connected to the Internet, and hundreds of different kinds of devices: laptops, tablets, phones, refrigerators, handheld credit card readers, and so on. Protocols (standards) ensure that the variety of devices interact with each other smoothly. There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the process they support.
C, a video solution that is adaptable to the users storage space
Answer:
C. Post-incident activity.
Explanation:
An incident is a event of intrusion or attack or violation of an attempt of an attack. An incident response is an opposing response to an attack or violation.
An incident response life cycle are stages followed to mitigate a current attack or violation. The stages of the incident response life cycle are, preparation, detection and analysis, containing and eradicating and recovery, and post incident activity.
A firewall determines what external network traffic(internet) should or should not be allowed to pass internal network(computer). A firewall is network security that protects software and hardware from untrusted sites that may have viruses, worms, and bugs that are detrimental to the computer.