Answer:
photoshop
Explanation:
(if there are answer choices pls comment them and I'll pick an answer from them, but this is just my best guess. : )
Firewalls are connected with a network device which blocks untrusted network forming a barrier in between trusted and un-trusted network.
Answer:
b
Explanation:
C and D have equivalent iterations
C: D:
99 990
90 900
81 810
72 720
63 630
54 540
45 450
36 360
27 270
18 180
9 90
Answer:
C. Post-incident activity.
Explanation:
An incident is a event of intrusion or attack or violation of an attempt of an attack. An incident response is an opposing response to an attack or violation.
An incident response life cycle are stages followed to mitigate a current attack or violation. The stages of the incident response life cycle are, preparation, detection and analysis, containing and eradicating and recovery, and post incident activity.