Answer:
D to Protect sensitive data, Enterprise has certain security features and is mostly used in business settings.
Answer:
advantages
- detect anomalies
- information for new security rules
disadvantages
- false alarms
Explanation:
Advantages
- With an IDS we can check and track every attack or detect anomalies even when you don't know about these behaviors.
- When an IDS detects anomalies, the system generates information about these behaviors and you can create new rules for these attacks.
Disadvantages
- When we use an IDS, we could receive false alarms because we cannot predict every behavior.
Answer:
Probability Distribution={(A, 4/7), (B, 2/7), (C, 1/7)}
H(X)=5.4224 bits per symb
H(X|Y="not C")=0.54902 bits per symb
Explanation:
P(B)=2P(C)
P(A)=2P(B)
But
P(A)+P(B)+P(C)=1
4P(C)+2P(C)+P(C)=1
P(C)=1/7
Then
P(A)=4/7
P(B)=2/7
Probability Distribution={(A, 4/7), (B, 2/7), (C, 1/7)}
iii
If X={A,B,C}
and P(Xi)={4/7,2/7,1/7}
where Id =logarithm to base 2
Entropy, H(X)=-{P(A) Id P(A) +P(B) Id P(B) + P(C) Id P(C)}
=-{(1/7)Id1/7 +(2/7)Id(2/7) +(4/7)Id(4/7)}
=5.4224 bits per symb
if P(C) =0
P(A)=2P(B)
P(B)=1/3
P(A)=2/3
H(X|Y="not C")= -(1/3)Id(I/3) -(2/3)Id(2/3)
=0.54902 bits per symb
Answer:
Physical / Data link layer
Explanation:
If two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, the data would be transmitted if the network is clear but if the network is not clear, the transmission would wait until the network is clear.
The Open Systems Interconnection model (OSI model) has seven layers each with its own function.
The physical layer is the first layer responsible for data transmission over a physical link. The data packets are converted to signals over a transmission media like ethernet cable.
The data link layer is the second layer in the OSI layer responsible for transmission of data packets between nodes in a network. It also provides a way of detecting errors and correcting this errors produced as a result of data transmission.
Answer:
The answer is "Option A"
Explanation:
Escalation is the process of manipulating a bug, design failure in software program to obtain elevated access to the resources, which are usually shielded from the user, and wrong choices can be described as follows:
- In option B, It is wrong because It can't provide any type of problem-solving.
- In option C, It is wrong because it is a searching module.
- In option D, It is wrong because it is used to verify the system.