Answer: Logical security list
Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.
These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.
Answer:
C) Single-user, multi-tasking operating systems
It doesn't really. The address is recognized as off the local network, so at the IP layer the packet is sent to the router, whose address is in the ARP table. As the packet travels to different hops, the MAC address is updated to the next hop.
Answer:
DNS stand for the domain name system and it is used to convert the IP address into the readable system. It basically used to store the data and link with the domain name and the IP address when it is requested.
DNS are important because there is no requirement of memorizing the IP address of huge number of websites and host computer. We only need to remember the domain name of that particular website as it save the IP address of all the particular websites.
In network architecture, the domain name system is very essential and important part.