Answer:
4. Regional Internet registries
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
With cybersecurity theory, security standards, frameworks and best practices we can guard against cyber attacks and easy-to-guess passwords such as using alphanumeric password with certain composition and strength.
Some examples of the Internet sources that hackers use to gather information about a company's employees includes;
I. Blogs.
II. Company website.
III. Social networking sites.
However, Regional Internet registries cannot be used by hackers to gather information about a company's employees because it is an internet protocol resource organization saddled with the responsibility of allocating and registering internet protocol (IP) addresses.
I think it’s c hope this helps
your organization has decided to use dhcp for ipv6. you want all windows 10 systems using ipv6 to get all of their tcp/ip information through dhcp. By setting up a Stateful network would you set up the network .
Why is DHCP utilized and what does it do?
Network devices are set up to communicate on an IP network using the Dynamic Host Configuration Protocol (DHCP).
A DHCP client utilizes the DHCP protocol to request configuration data from a DHCP server, including an IP address, a default route, and one or more DNS server addresses.
What are DHCP and DNS?
It is possible to translate domain names (like its.umich.edu) into IP addresses using the Domain Name System (DNS) on the Internet.
In order to automatically assign IP addresses and other parameters to devices when they connect to a network, there is a mechanism called Dynamic Host Configuration Protocol (DHCP).
Learn more about DHCP Server .
brainly.com/question/29432103
#SPJ4
Answer:
variables are letters/shapes that are next to a number and constants are numbers without a variable
Answer:
Pedro buys a subscription that allows him to watch movies online
Explanation:
Pedro <em>paid</em> for what he got, while the others were not paying for the good or service and did not have direct permission to use