Answer:
find reliable resources
Explanation:
if you find reliable resources, than you might able to have more help i know im not answering..but im trynna help
Answer:
"Case-Based Reasoning" is the answer for the above question.
Explanation:
- Case-Based Reasoning is a process of decision-making theory in which the new problems were solved based on the previously solved problem.
- It is used in artificial intelligence and robots. This helps to make any AI and robots to do the work and take decisions on its own.
- The theory is used to make any computer that behaves like humans. It can take decisions like a human.
- The above question asked about the method by which the new problem is solved on behalf of the old problem. Hence the answer is "Case-Based Reasoning".
Answer:
Risk management is the technique that is used for managing the risky situation so that security of the system or organization can be maintained. The risk can be reduced by parameters like monitoring the system,alertness, preventive measures etc. There are terms related with the risk management for prevention of the risk such as risk control ,risk identification and risk assessment .
- Risk control is the method that is used for calculating the loss or damage experience and then taking the correct measures to reduce the loss and thus, controlling the risk.
- Risk assessment is the analyzation of the threats and source of damage/loss that is caused or can be caused by assessing the whole process and functioning.
- Risk identification is the technique through which the threat is listed over a document and sorted in accordance with the category of risk, risk response etc.
Answer:
Agentless NAC
Explanation:
An active directory is a kind of storage service that holds data of objects like user credentials, resource location etc, for permission and network access authentication.
Network access control is a form of computer network security that integrates security technology like antivirus, intrusion detection and prevention systems etc to system authorisation and authentication processes to control access to a network.
An agentless network access control uses the active directory to scan devices to confirm its compliance to security policies.
Answer:
To ensure that the trainees are well acquainted with how to differentiate 568A cables and 568B cables, you must ensure they know appropriate color scheme pattern for the both cables. Also, they are expected to know the correct terminology when using both cables, as 568A is known as a crossover cable and 568B is known as a straight-through cable.
Explanation: