Answer:
Quality Of Service
Explanation:
Technology that manages data traffic to reduce packet loss, latency and jitter on the network. QoS controls and manages network resources by setting priorities for specific types of data on the network.
Answer:
Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.
Explanation:
Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.
An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:
- It defines what is required from organization’s employees for the security of the IT systems
- Information security policies provide a means to secure the organization against external and internal threats
- Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
- Information security policies are created to hold each employee responsible with regard to information security
Answer: an audio file containing speech
Explanation:
Answer: D. Deny read access to the Accounting folder for Bill through shared access security.
Explanation:
The statement that describes how to stop Bill from having read access to the folder without impacting any other users on the network is to deny read access to the Accounting folder for Bill through shared access security.
It should be noted that the local access security cannot be used in this case because the folder is shared from a network server that is within the active directory domain.