Answer:
Option 3 is the correct answer for the above question.
Explanation:
- A tarball is a software which is used to encrypt the other software or hide the other software and make it small. It again makes the original software program from the encrypted ones.
- It is used to make the file sort and can use for the transfer which takes some amount of memory.
- The above question asked about that technology which is used to make encrypted software from the original software and use it with the help of some script. Then the answer is tarball which is referred to from option 3. Hence Option 3 is the correct answer for the above question while the other is not because--
- Option 1 states about the package manager which is used to manage the library only.
- Option 2 states about the DBMS which is used to manage the database.
- Option 4 states about the router which is used for the internet.
Answer:
The answer is "Option A"
Explanation:
Escalation is the process of manipulating a bug, design failure in software program to obtain elevated access to the resources, which are usually shielded from the user, and wrong choices can be described as follows:
- In option B, It is wrong because It can't provide any type of problem-solving.
- In option C, It is wrong because it is a searching module.
- In option D, It is wrong because it is used to verify the system.
Answer:
There are various ways: Handing out papers/fliers to people, or presenting slides.
The answer is C) Availability.
Although the company is addressing scalability by adding more servers, the question is asking for security requirement. Therefore we need to choose one of the principles from CIA triad which includes confidentiality, integrity, and availability.
Integrity involves keeping the data accurate and confidentiality involves keeping the data between the sender and intended recipient(s). That being said, scalability and availability are the possible answers.
C) Availability is the best answer because it is part of the CIA triad.
Note: Another resource to look at for cyber security principles would be the Parkerian Hexad.
Yeh it’s becoz they work with hardware that’s why