<u>The various systems on a network and develop a logging policy based on the information in the aforementioned sections:</u>
Cisco is router, which is physical device appliance where placed in LAN OR WAN for connecting workstation or desktop or laptop of other offices in organization.
It is a security device and purpose to make organization to access or connected to end use of other networks.
Basically there routers are used ISDN LINE, LEASE LINE or VPN for connecting varies WAN
Purpose of keeping the logging polices to do further analysis how the network packets or traffic is executed and passed different tcpip address. If case any hackers or packet loss the network administrator will do further analysis and protect the system form packet loss or from hackers. Keeping network logs is policy driven. So network administrator keeps logs for no. of days.
Some network administration export log and keep as reference.
Virus such as a Trojan or Worm, and can cause network crashes.
Answer:
huwugsgssuaihsux h baiThatha svaadishht us
Public key and private key - In public key encryption, a pair of keys is used (public key and private key). The public key can be made available publicly, while the private key is only known by the owner. The public key is used to encrypt the message, while the private key is used to decrypt the message.