Disk encryption is highly risky response.
<u>Explanation:</u>
To protect or loss of serial data loss on mobile devices it is not advisable to implement full disk encrypted. Once full disk encrypted is implemented mobile access is very slow. End-user will complain to IT administrator.
Best solution either removes unwanted or unauthorized application from mobile to protect the data loss. Install antivirus program in each mobile.
Access or permission to application is removed so that mobile data loss can be avoided. End user should also be advised not to click on any link which they receive through SMS messages or other through any applications.
Answer:
The correct answer for the following question is VLAN.
Explanation:
It stands for Virtue Logical Area Network which allows you to group port on a switch logically. VLANs can be extend across (a period of time) multiple switches means you used to express on port that you're in that VLAN by changing the VLAN number.
We have the ability to improve our security with VLANs by controlling what VLAN is accessing with the other network of VLANs. So that this network is particularly helpful in office situation to create subdomain without wiring physical domain as your network.
Answer:
b=0
c=0
lol=list()
while True:
salary=input("Enter your salary: ")
if salary=="e" or salary=="E":
print("Thankyou!!")
break
else:
a=int(salary)
if a>=300000 and a<=400000:
c=c+1
if a<0 or a>400000:
print("Your salary is either too small or too big ")
if a>0 and a<=400000:
a=a-(25/100*a)-(5/100*a)-(2/100*a)
lol.append(a)
b=b+1
if a>=300000:
c=c+1
print(lol)
print("The number of salaries entered is: "+ str(b))
print("The number of salaries that exceeded 300000 is: "+str(c))
Answer:
C and D
Explanation:
The other 3 answers don't even involve talking.
Answer:
Eve is employing a <u>chosen-ciphertext attack.</u>
Explanation:
Encryption is a strategy employed in the cyber world to allow sensitive and private data to be unreadable in the form of text or make the content of the data inaccessible by intruders. This is imperative to guard data and can only be accessed with the use of a key (password). Whoever has the authorized key could get access to the data thereby making the encrypted data readable in the process called Decryption.
The Ciphertext is a term used to explain data encrypted in the form of text.
When Eve tricked Alice into decrypting a bunch of ciphertexts, she was interested in having the general public key or private key depending on what she wants to get access to which makes it a chosen-ciphertext attack. Usually, these keys are in algorithm formats with long characters. When the chosen-ciphertext is analyzed by Eve, then she could guess the user secret key.