Answer: True
Explanation: For the creation of the security services and function the first step is having a policy regarding the security measure that is to be taken.Security policy consist of the procedures and function that should be implement in the system as a plan.
It monitors the flow,accessing of external component ,data assessment etc fro the protection.After the policies are made then the implementation take place. The most common deployment of this policy is in information technology(IT)sector .Thus, the given statement is true..
Answer:
so people can't get your information and use it to their advantage and because you never know what people could do with that information
Explanation:
Answer:
The switch sends broadcast traffic to all ports like a hub to get the number of ports used and build its MAC address table.
Explanation:
A network switch is a device used in a LAN to connect all available workstations. Unlike a network hub, it is able to send frames from a host or workstation to another using its MAC address table.
An example of a switch is the Cisco 2950 switch. When it is first turned on, it acts as a hub, broadcasting traffic to all its ports. This process is used to create a MAC address table to get the IP address of workstations and the ports they relate to, enabling it to send unicast traffic to a specific port.