Answer:
False
Explanation:
Without any police, a privacy can easily be compromised.
Cut is were it deletes content from the screen, but it is still in the memory.
And Paste is where it uses a cut or copied item appear again at a specific location.
http://www.issco.unige.ch/en/research/tutoriel-informatique/EN/copy_cut_delete_move_and_paste.html
Graphical management tools and infrastructure, Server graphical shell
Answer:
b. Honeynet
Explanation:
Honeynet
It is a network , which is set up with the intentional vulnerabilities , in order to invite the attack , in order to determine and study the activities of the attacker .
The Honeynet is composed of one or more honey pots , which are just the computer systems , which act as a bait to trap the people who , tries to hack or penetrate into other's computer system .