Answer:
It is good practice, however, for policy <u>Administrator </u>to solicit input both from technically adept information security experts and from business-focused managers in each community of interest when making revisions to security policies.
<u>Explanation</u>
Administrator is the person who has access to each part of the computer. Ha has rights to revise, add or edit application. The administrator is authorized to make and implement policies that are for the interest of the community.
Multiple research has been conducted with regards to this point of view, but the common conclusion is that it depends more on the platform. People tend to be more dishonest when not comfortable and when given the chance live off their fantasy even for short while online. We all do agree that an example is the social media where in order to get attention we only share positive things. You might want to check speaker Simon Sinek and see rich views and in depth understanding of how technology has changed us.
<span>In which career field, would the Computing Technology Industry Association's CompTIA A+ certification be useful?</span>
Answer:
Never heard of that lol
Answer:
Blocking Mode
Explanation:
Spanning Tree Protocol is used to allow path redundancy in the network without creating cycles/circles also called loops.
When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop.
This affects the performance of the network as the result of broadcast packets flooding.
STP puts one port of the switch to forwarding mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to blocking mode and the one port that is left after this is placed in forward mode.
Spanning Tree Algorithm is used by STP to determine the optimal path of switch to the network.
Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.
This information helps STP to eliminate the redundant paths.
So this is how STP allows only one active path to the destination while blocking all other paths to avoid switching loop.