Answer:
C. Bottom-up approach will be used in this scenario.
Explanation:
The OSI or Open Systems Interconnection is an architecture that comprises of seven (7) layers, each layer unique in its functionality. The layer is listed below:
7. Application layer
6. Presentation layer
5. Session layer
4. Transport layer
3. Network layer
2. Data link layer
1. Physical layer
Layer 1 - 3 are considered the hardware layers, Layer 4 is considered as the heart of the OSI model while layers 5 - 7 are considered the software layers.
Back to our question, once you decide to troubleshoot from the physical layer of the OSI model, you are troubleshooting this problem from a bottom-up approach.
An unsecured wireless network is a network that does not use an encrypted authorization mechanism, such as WPA2 or similar.
Answer: 8 bits is a byte. 1000 bytes are a kilobyte. 1000 kilobytes are a megabyte.
Answer: Incident response plan
Explanation: Incident resource plan is the strategy that is created in the form of plan in the information technology (IT) department. This plan is made for the detection of the staff, issue or problem that arise, loss of data etc. This plan works in the situations like cyber-crime, data hacking etc.
Other options are incorrect because they done have any well defined strategy for the hacking or attacking situation rather control the security issues. Thus the correct option is incident response planning.
Answer:
C
Explanation:
As I can see Maria needs to use a method that will help her provide a set of questions to the client so I'm sure she will need a questionnaire