Answer:
A and C
Explanation:
Option A:
In IPv6 there is a rule to reduce an IPv6 address when there are two or more consecutive segments of zeros just one time. This rule says that you can change the consecutive zeros for “::”
Here is an example
How to reduce the following IPv6 address?
ff02:0000:0000:0000:0000:0000:0000:d500
Ans: ff02::d500
Example 2:
2001:ed02:0000:0000:cf14:0000:0000:de95
Incorrect Answer -> 2001:ed02::cf14::de95
Since the rule says that you can apply “::” just one time, you need to do it for a per of zero segments, so the correct answer is:
Correct Answer -> 2001:ed02::cf14:0:0:de95
Or
2001:ed02:0:0:cf14::de95
Option C:
Since in IPv6 there are
available addresses which means 340.282.366.920.938.463.463.374.607.431.768.211.456 (too many addresses), there is no need of NAT solution, so each device can have its own IP address by the same interface to have access through the internet if needed. If not, you can block the access through internet by the firewall.
Answer:
A. Multifactor authentication
Explanation:
Multifactor authentication is a security system process that requires a user to verify his or her identity by providing two categories of credentials.
A mobile device user has entered her user ID and password to access an online account, she immediately receives a text message with a unique PIN or One Time Password (OTP) that must be entered before she is granted access to the account. This is an example of a multifactor authentication security method.
Well, I would say a web browser, like Mozilla Firefox, Safari for IOS, Windows Edge, Chrome, or Internet Explorer; and some anti-malware software, since there are multiple websites on the WWW that try to steal your information and give your device viruses.
Answer:
All traffic that flows between the laptop and VPN server is encrypted.
Explanation:
A Virtual Private Network (VPN) is a "tunnel" connection between computers that performs just like a regular point-to-point network connection (that is, IP address to IP address). It has the added feature that encryption is enabled so that no intermediate server (or computer or line monitor, etc.) can decode the information that is in the data portion of the packets.
Answer:
3. Granularity
Explanation:
Granularity's concept is representing the level of how do we store the data in our database.
If the data are detailed, we can resume the data until get a granularity more strong for our analysis.
For example:
We could store data year by year of our costumers, if want to get more granularity, we could store data month by month, also we could get specific data like how often our customers visit the business or how often our customers buy in a category product.