Answer: The risk of obsolescence
Explanation: This is in fact the risk that some process, technology or hardware used in the company is outdated, so there are newer, more innovative products, hardware, etc. In this way, the use of such outdated technologies and the like, creates the opportunity to reduce competitiveness in the market, which directly affects the point of each company, which is profit. So in this case too, the risk of obsolescence led to the situation that outdated technology, specifically, the use of an old compact disc, prevents a smooth business process. Not keeping up with new technologies creates this kind of risk, which consequently leads to the inability to access certain data required for the operation of the company, which affects profit.
Answer: Snort
Explanation:Snort is a system which provides the service of the prevention of the intrusion. This system works as the open source for provision of the logging of packets and traffic analysis.
The functions in the snort are analysis of the protocol, content matching , searching etc. The main purpose of it is for the detection of the attack like stealth port ,CGI attacks etc.Other options are incorrect because they don't provides attack detection service.Thus the correct option is snort.
The process that involves writing down your main ideas, subpoints, and supporting material, then using geometric shapes is mapping.
This includes uses of arrows to indicate logical relationships.
<h3>What is mapping?</h3>
mapping can be regarded as the prescribed way of assigning an object to each object in one set a particular object.
Learn more about mapping at:
brainly.com/question/25168859
Answer:
WHITE HACKERS
Explanation: When a white hat hacker discovers a vulnerability, they will exploit it only with permission and not tell others about it until it has been fixed. In contrast, the black hat will illegally exploit it or tell others how to do so. The gray hat will neither illegally exploit it nor tell others how to do so.