Answer:
suppose i was i would tell them i dont know and walk away
Explanation:
in thoery this is correct
you said suppose so i answerd
there is no use in reporting or getting this taken down
nether is it right
im not stealing points
Because in thoery its an answer
<em><u>THIS IS MY PROTEST</u></em>
Answer:
There's a parking lot that is 600m² big. The lot must be able to hold at least 3 buses and 10 cars.
Each car takes up 6m² and each bus takes up 30m².
However, there can only be 60 vehicles in the lot at any given time.
The cost to park in the lot is $2.50 per day for cars and $7.50 per day for buses. The lot must make at least $75 each day to break even.
What is a possible car to bus ratio that would allow the lot to make profit?
Answer:
Cccccccccccccccccccccccccccccccccc
Answer: Site Link
Explanation: Site link is the type connection that is created for the different sites.It helps in the connectivity in the multiple site surrounding known as inter-site and transferring the traffic created by the replication activity.
Other options are incorrect because bridgehead servers is a device to control the domain,subnet is the part of the IP network and domain is used for the identification of address .Thus, the correct option is site link.
Answer:
The correct answer is option (D) Identify the impact on safety of the property
Explanation:
Solution
In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.
Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.
Example of property can be software, equipment, facilities, company’s assets.