Answer:
it would be nice if you gave some form of info here
Explanation:
in other words without information no help aka I'm slow and just need points
Override only
Reason because the same method speak is in the parent and child class
Answer:
Yes
Explanation:
We known that TCP is the connection protocol. So the TCP expects for the target host to acknowledge or to check that the session has been established or not.
Also the End stations that is running reliable protocols will be working together in order to verify transmission of data so as to ensure the accuracy and the integrity of the data. Hence it is reliable and so the data can be sent A will still be delivered reliably and it is in-sequence at B.
A solution which would best meet the CSO's requirements is: B. Sandboxing.
<h3>What is a sandbox?</h3>
A sandbox can be defined as an isolated environment in a computer system or on a network that is designed and developed to mimic end user operating system (OS) and environments, so as to detect unauthorized execution privileges from the operating system (OS).
In cybersecurity, sandboxing is typically used to safely execute suspicious code and data files without causing any harm to the host device or network. Also, sandboxing can work in conjunction with proxies or unified threat management (UTM).
Read more on sandboxing here: brainly.com/question/25883753