Answer:
d. IPv4 Address 192.168.0.4 is associated with the globe IPv6 address 2001:db8:0:10:0:efe
Explanation:
The adapter setting will be associated with the global IP address. When Ipconfig command is operate the IP address finds the relevant domain and then address will use a different subnet. The network will use both IPv4 and IPv6 subnets in order to execute the command.
Answer: Resolution
Explanation: The total number of pixels that can be displayed on the screen at a time is called the resolution of the screen. This resolution is normally described in the pair of numbers, such as 2560 x 1440. This means, the computer screen is 2560 pixels wide and 1440 pixels tall.
Answer:
ISO 27002
Explanation:
The acronym ISO stand for The International Organization for Standardization. its a non governmental body that is responsible for setting standards guide internationally.
while NIST stand for National Institute of Standards and technology and it is also a body that is responsible for setting up standard guide in the US..
ISO 27002 is a standard code for implementing information security management systems. while ISO 27017 is for cloud security. NIST 800-12 is a general security and NIST 800-14 is for policy development. thus option A is correct.
Note :
All code preceded by ISO is from The International Organization for Standardization and are international standard. while those preceded by NIST is from National Institute of Standards and technology and are not international standard.
Answer:
D. He should designate all the files in the shared folder as read-only.
Explanation:
The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.
In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.
By default, he is already the owner of the file, so option B is not the correct answer.
Also making the file executable give other users higher privilege, so option A is also not correct.
Answer:
The operations that can be carried out using process explorer include but are not limited to:
Explanation:
- Killing a Process Tree
- Ending or terminating a process
- Suspending a process
- Examining which process has locked a file
- Manually detecting a virus
- Unhiding a process. This can help to callup the window for a process that is not visible under normal explorer activities
- Monitor CPU usage
- setting the priority of a process
- changing a service process's access security
- Monitoring Graphics Processing Unit
Cheers