Answer:
The correct answer is: Bus Topology.
Explanation:
Bus Topology is a network setup where all the computers are connected to a single cable. Servers can connect easily to the network but it implies everyone connected has access to what everybody in the same network is doing. Security options are limited to no-existent under this topology.
In that case, if technicians cannot isolate a virus infection problem, it is the result of working with a bus topology where more than one computer is connected to the same network and every terminal has access to each terminal.
Answer:
The correct answer to the following question will be "Application program".
Explanation:
- Applications include database programs, word processors, browsers, development tools, picture editors, and platforms for communication.
- It use the OS (Operating System) of the computer and many other assisting programs, frequently system software, to work.
- An application program is a detailed, body-contained program that directly works a given function for just the user.
There are some examples of application programs such as:
- Includes various bundled software.
- Addresses an organization's data management and application requirements, covering all divisions.
- It allows users can create and manage information.
- Used primarily to get content access without editing.
Variables can be useful because they hold a certain number/data value that can easily be accessed and changed. For example, in a game, a players score is a variable that changes as the player gets more points; ie coins, items, etc.
Answer:
The correct answer is option (D) Identify the impact on safety of the property
Explanation:
Solution
In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.
Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.
Example of property can be software, equipment, facilities, company’s assets.
An literation :))!! i hope u get it right lol