Answer: Authorization process
Explanation
Authorization is a security measure to determine the access levels or user/client rights to use to system resources like files, computer programs, data and other features on a computer. Authorization process is the process of granting or denying access to a network resource that allows the user access to various resources based on the his/her identity.
Most web security systems are based on a two-step Authorization process. The first step ensures and approves the user's identity, that is authentication and the second stage is authorization, which allows the user to access the various resources based on the user's identity.
Therefore the first thing you should do when you suspect "illicit use of, or threats to, computer resources and sensitive information is a strong authentication and authorization process".
Answer:
It can be repaired with disk utility / recovery algorithms
In UNIX it can be done by scanning
In FAT file scan the FAT looking for free entries
Explanation:
When the crash happens, it is not a problem for UNIX and FAT file system
It can be repaired with disk utility/recovery algorithms.
The recovery algorithm is a list of all blocks in all files and takes a compliment as new free file.
In UNIX scanning can be done at all I-nodes.
In FAT file problem cannot occur because there is no free list .If there was any problem than it would have to be done to recover it to scan the FAT looking for free entries.
Answer: c.)
Explanation:
The bit SYN is used in order to synchronize segment numbers in the sender and receiving processes in hosts that are trying to start a data transmitting session between them.
It is initiated by the sending end, that set this bit to " 1", in the TCP header, starting which is known as a "3-way handshake process".
The bit SYN is not used in order to close a connection, the FIN bit is used for this purpose.
If one process set the FIN bit to "1", this means that it has no more data to send.
Tony uses the Document Inspector dialog box to <u>remove confidential company information</u> from the presentation.
Explanation:
Document Inspector dialogue box has come as boon to the presentation and office document makers. This saves them from any discrepancies’ regarding revealing any sensitive information, unwanted information, hidden data’s etc.
These information’s if released can be a matter of concern for the employee as well as an organisation. Document inspector prevents an employee from later embarrassment and any legal troubles arising out of his actions.
Hence, Tony who is in charge of Fortune 500 pharma company decided to use Document Inspector dialogue box to make sure that his presentation his complete in all aspects of professionalism and is bereft of any sensitive and unwarranted information.