Answer:
b. Disciplines
Explanation:
The Unified Process (UP) is a type of development framework that repeats itself and can be customized and used for several different variations of the same underlying process. In the Unified Process (UP), related activities are grouped into UP Disciplines, as one of the many components that make up the Unified Process.
A general rule for adding text to
a slide is to use not more than two fonts in a presentation and vary the font
size. Furthermore, to make a slide legible, in addition to the point size, attention must be paid to the word count per slide, the choice of typeface, and the visual
balance of space to text.
The CPU is the most important. It is the brains of the Computer.
Answer:
Option (C) is the correct answer of this question.
Explanation:
Smart card is the security administrator wishes to implement two-factor authentication to improve security.Normally this data is affiliated with either meaning, information, or both, and will be stored and transmitted within the chip of the card.A smart card, usually a Chip Card type.
- It is a flexible card that holds an integral computer chip that preserves and sends a signal data, either database or semiconductor form.
- Used for controlling access to a resource.
- Data authentication, encryption, cloud storage, and software processing can be established by smart cards.
Other options are incorrect.
Answer:
C. Trojan
Explanation:
In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.
This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.
In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."
Some of the ways to prevent vulnerability in a network are;
1. Ensure you use a very strong password with complexity through the use of alphanumerics.
2. You should use a two-way authentication service.
3. You should use encrypting software applications or services.