Could be second or all of above
Answer:
vulnerability, risk
Explanation:
A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.
Answer:
The answer to this question is "Document management software".
Explanation:
Document management software is software that provides a facility to stores data in an organized manner. It manages and tracks its electronic documents.
- This software controls many fields, that are Storage location, Security and access control, Version control, etc.
- It is a common component, that is found in an Enterprise Content Management environment, that uses this software.
Wait what is the question? All you are saying is a fact. :|
Answer:The kernel provisions hardware resources to meet software requirements.
Explanation: Kernel is the program which behaves as the central component of the operating system.The main purpose of the kernel is to control the operation of the system to manage it.
Monolithic kernel and micro-kernel are two types of kernel units present in the computer system where they work for fulfilling the software requirement by attaching it to the hardware parts.
Other option are incorrect because it does not work for Cisco device, does not perform any specific feature only , no linkage is created between the hardware and the electronics nor reacts as navigation bar.