Answer: Source
Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.
The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .
The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.
If a router tried to match a packet sourced from IP address 1.1.1.1 using this ACL, the first statement will be used.
a. First
<u>Explanation:</u>
We use ACL technology to make basic security level in the network. ACL is strictly used to update the routing in the network and make sure network pears and make sure the flow control for network traffic is followed.
Since it is routing ip address through ACL statement. It all depends on how the network engineer routed the traffic in the network. A packet with source IP address 1.1.1.1 would match any of the three explicitly configured commands described in the question. As a result, the first statement will be used.
The router searches the ACL statement by order and when the match is found it stops execution of the ACL statement that will match with the first occurrence.
Answer:
8/9
Explanation:
i remember this question on my daughters book
5x2 =69
Explication but brain