Answer:d)apprehend and prosecute
Explanation: A intruder is a person who tries to access the system or damage it in an unauthorized manner. The person who is found with any intruding activity should be discovered.
Apprehending means of getting aware and prosecute defines the accusing of any person committing a crime .These activities define the nature of the intruder whose trying to commit the crime and should be detected while he is pursuing the activity.Thus , the correct option is option(d).
Answer:
Blocking Mode
Explanation:
Spanning Tree Protocol is used to allow path redundancy in the network without creating cycles/circles also called loops.
When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop.
This affects the performance of the network as the result of broadcast packets flooding.
STP puts one port of the switch to forwarding mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to blocking mode and the one port that is left after this is placed in forward mode.
Spanning Tree Algorithm is used by STP to determine the optimal path of switch to the network.
Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.
This information helps STP to eliminate the redundant paths.
So this is how STP allows only one active path to the destination while blocking all other paths to avoid switching loop.
<span>Not a valid IPv6 address
A valid IPv6 address consist of 8 groups of 4 hexadecimal numbers separated by colons ":". But that can make for a rather long address of 39 characters. So you're allowed to abbreviate an IPv6 address by getting rid of superfluous zeros. The superfluous zeros are leading zeros in each group of 4 digits, but you have to leave at least one digit in each group. The final elimination of 1 or more groups of all zeros is to use a double colon "::" to replace one or more groups of all zeros. But you can only do that once. Otherwise, it results in an ambiguous IP address. For the example of 2001:1d5::30a::1, there are two such omissions, meaning that the address can be any of
2001:1d5:0:30a:0:0:0:1
2001:1d5:0:0:30a:0:0:1
2001:1d5:0:0:0:30a:0:1
And since you can't determine which it is, it's not a valid IP address.</span>
Answer is
(HMAC)
Hashed Message Authentication Code
This combines authentication via a shared secret
cryptography algorithm key with hashing. It involves the client and server each
with a private key. The client creates a unique hash per request to the server
through hashing the request with private keys.
Answer it your own self everybody can't always give u the answers