Answer:
A and C
Explanation:
Option A:
In IPv6 there is a rule to reduce an IPv6 address when there are two or more consecutive segments of zeros just one time. This rule says that you can change the consecutive zeros for “::”
Here is an example
How to reduce the following IPv6 address?
ff02:0000:0000:0000:0000:0000:0000:d500
Ans: ff02::d500
Example 2:
2001:ed02:0000:0000:cf14:0000:0000:de95
Incorrect Answer -> 2001:ed02::cf14::de95
Since the rule says that you can apply “::” just one time, you need to do it for a per of zero segments, so the correct answer is:
Correct Answer -> 2001:ed02::cf14:0:0:de95
Or
2001:ed02:0:0:cf14::de95
Option C:
Since in IPv6 there are
available addresses which means 340.282.366.920.938.463.463.374.607.431.768.211.456 (too many addresses), there is no need of NAT solution, so each device can have its own IP address by the same interface to have access through the internet if needed. If not, you can block the access through internet by the firewall.
Answer:
achieve physical security
Explanation:
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to <u>achieve physical security </u>
Answer:
Confirmation biases impact how we gather information, but they also influence how we interpret and recall information. For example, people who support or oppose a particular issue will not only seek information to support it, they will also interpret news stories in a way that upholds their existing ideas.
Answer:
A
Explanation:
Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. ... When transmitting electronic data, the most common use of cryptography is to encrypt and decrypt email and other plain-text messages.
Answer: C. File encryption
Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.