Answer:
The correct answer is d) all of the above
Explanation:
The size of the info is necessary to give the users heads up about the amount of data needed to access it, the type of the video is also important so the user can know the environment appropriate for viewing it and also tips for viewing will help users know the requirements needed to view it.
Answer:
d so if he comes back any time soon
Explanation:
Answer:
The source and destination IP addresses are 10.0.1.19 and 10.0.1.25
Explanation:
NAT or network address translation is a network protocol is used by private networks to access the internet by assigning or mapping a public IP address to the private addresses.
The host with IP address 10.0.1.19 searches for the actual destination IP address 128.119.160.183 in its private network and when it does not find it, it sends the packet to the default gateway IP address 10.0.1.25, which is where the private IP address is NATted and sent to the destination.
Answer:
Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.
Explanation:
Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.
An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:
- It defines what is required from organization’s employees for the security of the IT systems
- Information security policies provide a means to secure the organization against external and internal threats
- Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
- Information security policies are created to hold each employee responsible with regard to information security