Answers:
1- cell address ( i think)
The answer is : 2001:DB80:1470::200
A double colon ( :: ) can replace any single, contiguous string of one or more 16-bit segments (hextets) which is consist of all 0s, and it can only be used once per IPv6 address. Therefore,any leading 0s (zeros) in any 16-bit section or hextet can be omitted.
Answer:
Number of fragments is 3
Explanation:
The maximum size of data field in each fragment = 4468 - 20(IP Header)
= 4448 bytes
Hence, the number of required fragment = (10000 - 20)/4448
= 3
Fragment 1
Id = 218
offset = 0
total length = 4468 bytes
flag = 1
Fragment 2
Id = 218
offset = 556
total length = 4468 bytes
flag = 1
Fragment 3
Id = 218
offset = 1112
total length = 1144 bytes
flag = 0
Answer:
Key escrow.
Explanation:
If a full disk encryption (FDE) password is forgotten, a key escrow can be incorporated to securely store the encryption key to unlock the disk.
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
<em>Therefore, when a full disk encryption (FDE) password is forgotten, a key escrow if incorporated can be used to retrieve the password. Subsequently, the password would then be used to unlock or decrypt the disk.</em>