Answer:
<em>Solution</em>:
The statements are listed below.
<em>(A) Functional requirement </em>
- Functional specifications refer to the handling of calls.
- Minimum call number should be 3000, and a functional requirement.
<em>(B) Non-functional requirement</em>
- Non-functional requirement is the default option.
- Payment in "Visa" is required and this is not a functional requirement.
<em>(C) Data requirements</em>
- Data requirements apply to quantity of order.
- When the quantity of data exceeds then an exception should be notified
<em>(D) Business requirements. </em>
- Product reviews are subject to business requirements.
Answer:
The correct answer to the following question will be Option C (Firewall monitoring).
Explanation:
Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.
Usually, management of the firewalls should include:
- Monitoring the firewall file.
- Management of the firewall statute.
- Monitoring the design of the firewall.
Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.
Therefore, Option C is the right answer.
You should state the language you're using in these types of questions; here's an example in C++.
bool isQuad;
int sides;
std::cout << "How many sides does the shape have?";
std::cin >> sides;
if (sides == 4)
isQuad = true;
else
isQuad = false;
Answer:
Sara: Personal data
Jorge : Personal data + official data.
Wanda: Personal data + students data
Carl: Personal data + official data
Explanation:
Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.
Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.
Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.
Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.