The answer is C. Choose a topic that he is interested in and wants others to know more about.
Answer:
b. IaaS Infrastructure as a Service
Explanation:
- Infrastructure as a Service is a cloud infrastructure service or platform which provides with the computing resources like servers, storage services, backup service and networking services.
- These services are provided to the organizations by cloud service providers to fulfill their business and resources requirements and the users have to purchase these services.
- These resources and services are provided from the data centers of the cloud service providers.
- It is beneficial to utilize these virtual services from a third party provider than to buy the hardware equipment and the consumers can use these services as per their needs and are charged accordingly instead of purchasing their own hardware which often gets difficult to maintain.
- These services also provide and manage the operating systems, the applications and provides with the backup services, internet connection, security such as firewall and access controls and manage storage such as hard drives. Users can install and run any applications.
- Iaas offers scalability as it can add resources and services with the growing requirements of the users.
PEMDAS (parenthesis, exponents, multiplication, division, addition, subtraction).
Sending potentially sensitive information by email
Potentially sensitive information can be sent via Email only if the Email is encrypted
Explanation:
No doubt Email is an inexpensive efficient means of communicating quickly. But it is prone to hacking and it is not a secure mechanism. In order to add security ,the Email needs to be sent in an encrypted form. Banking and HIPAA regulations require the emails to be sent in encrypted form as it is a secure mechanism. Even if one has the consent from the client , the Email has to be in encrypted. Even if the Organization's e-mail system has appropriate firewalls and related infrastructure , the golden rule is to send encrypted format Emails.
Answer:
FF-FF-FF-FF-FF-FF and 255.255.255.255
Explanation:
FF-FF-FF-FF-FF-FF can be defined as the layer 2 address broadcast which is often used on ethernet frames as well as help to broadcast all equipment due to the fact broadcast is made possible through Ethernet networks in which the Frames are addressed to reach every computer system on a given LAN segment as far as they are addressed to MAC address FF:FF:FF:FF:FF:FF.
255.255. 255.255 can be seen as the layer 3 address which help to address the exact same hosts because it enables the broadcast address of the zero network which is the local network due to the fact that the IP broadcasts are often used by BOOTP and DHCP clients to find and send requests to their respective servers in which a message sent to a broadcast address may be received by all network-attached hosts.
Therefore the Layer 2 and Layer 3 destination addresses which the message contain are FF-FF-FF-FF-FF-FF and 255.255.255.255