1. true
2. pixel
3. raster images are built with pixels
4. false
5. image size
6. rollover
7. sharp with clear details
8. 78px
9. 24in
10. scalability
Answer:
The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.
The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.
The Continents were all joined into one land mass
Answer:
Following are the steps with actions that are involved in required to perform a packet transfer.
Explanation:
- Step 1: The host sends a connection request to server which is at IP address 209.165.200.254
- Step 2: R1 check the configuration of NAT to inquire weather the packet should be translated or not.
- Step 3: If there is no entry found for translation of given IP address, It is assumed that the IP address 192.168.10.10 will be translated already.
- Step 4: R1 selects a global address from the dynamic address pool that is available to it.
- Step 5: R1 replaces the given IP address 192.168.10.10 with the translated inside global address.
i hope it will help you!