That answer would be B hope it helps
Babahskdjdndnd jbsbsjsjsnsns ndsnssnsnsnxjxjx skzjnansmansna Jaunansmans
Answer:
C. DAT-1
Explanation:
Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.
Common hashing algorithms applied, include; the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.
<h2>Upgrading and retraining are mandatory to move along with the world.</h2>
Explanation:
Let us understand the term deeply,
Upgrading - Updating yourself with the latest
Retraining - learning new skills
Let me give you a real-life example which is nothing but "mobiles". If you are not updated then:
- you will sit with mobile to make calls and
- do money transactions only by stepping into the bank,
- connect with people only through calls or directly visiting them,
- distance break up the relationship,
- booking tickets in classical way, etc.
These could be done in one touch if you have latest mobile with necessary applications.
In a similar way, we need to get retrained to get to learn new skills, technologies so that we can do our job the best, to be on track, be productive, convert your valuable knowledge in terms of money, to be peaceful in day today transactions, etc.
Is an example of reactive, signature based IDS/IPS
Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.