Answer:
positive
Explanation:
it shows good customer service
Answer:
Border Gateway Protocol is a protocol the routers use to determine the most optimal path to forward the traffic.
Explanation:
BGP is a path vector protocol which chooses the most optimal path. The protocol decides core routing decisions based on path, configuration and network.
This protocol gives all the notification about the status of the connection and router.
It is used to routing in an autonomous system and provides ways to measure the effectiveness of configuration.
Explanation:
These are the advantages of breaking up a single logical message into a number of fixed sized packets.
- When messages are broken into packets it increases the performance and also the reliability of the internet
- if there is an error in a single packet, this error is not going to affect the entire message.
- the efficiency of the communication line in the internet is improved.
- there is a reduction of traffic. Each packet in a single message can be transmitted through different routes.
- It reduces idleness as each packet can send from different program so each program has a service.
A Design Basis Threat (DBT) is known to be a characteristics of any given or potential insider and also those of external adversaries, that may try to have or gain unauthorized removal or sabotage, against a physical protection system that was set up designed and evaluated.
<h3>What are Cybersecurity objectives?</h3>
Cybersecurity aims are:
- To protect computer system,
- To protect networks,
- To protect software programs from such cyber attacks.
Note that a lot of digital attacks are targeted at accessing, changing, or deleting sensitive information as well as others.
Learn more about IT from
brainly.com/question/1276995
#SPJ1