Answer:
b. Customized auditing.
Explanation:
Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.
There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.
The credentialed scanning provides baseline and customised auditing features.
Answer:
MAC Addresses (Destination and Source MAC address)
Explanation:
A switch has 3 primary functions:
- Forward frames
- Learn addresses
- Avoid loops
An Ethernet frame has the header, data and trailer and there are two specific fields in the header that helps the switch to know where to send data in future transmissions.
- destination MAC address
- source MAC address
every Ethernet frame has this and when the frame hits a switch or any device, any device can look at it ( an Ethernet frame ) and know where it is suppose to go and where it came from.
Every switch has a MAC address table where it stores MAC addresses of different computers on the network.
Example:
When a PC1 sends a frame to PC2 through a switch, the switch looks at the header of the Ethernet frame for the source mac address and adds the source MAC address to its MAC address table and also the port that it came through.
simply put:
A switch looks at the source MAC address to see if it knows it already, if it does. Great! no need to add it again to it's address table.
If it doesn't, it adds it's source address and the port that the frame came from.
This basically how the switch populates its MAC address table.
Answer:
// here is code in C++.
#include <bits/stdc++.h>
using namespace std;
// main function
int main()
{
// variables
int x=5,y=2,z=9;
int min;
// find the smallest value and assign to min
// if x is smallest
if(x < y && x < z)
// assign x to min
min=x;
// if y is smallest
else if(y < z)
// assign y to min
min=y;
// if z is smallest
else
// assign z to min
min=z;
// print the smallest
cout<<"smallest value is:"<<min<<endl;
return 0;
}
Explanation:
Declare and initialize variables x=5,y=2 and z=9.Then check if x is less than y and x is less than z, assign value of x to variable "min" .Else if value of y is less than value of z then smallest value is y, assign value of y to "min".Else z will be the smallest value, assign its value to "min".
Output:
smallest value is:2
Answer: See explanation
Explanation:
Following the information given in the question, the testing process for the website will include testing the links that are on the site.
Another that ng to test is to check if the menus and the buttons are working properly. Furthermore, the layout should be ensured that it's consistent as well as the ease with which the website can be used.
Answer:
Tags can be identified as they are written as <tagname> Something </tagname>
<tagname> this tag is called start tag.
</tagname> this tag is called as end tag.
for ex:<p> This is a paragraph </p>
There are some elements with no end tag.for ex:- <br> tag.
Attributes are used to provide additional information to an HTML element.
Every element can have attributes.
for Ex:- <h1 style="background-color:red";>MY WEBSITE </h1>
So the background of h1 will become red.