D. Animus,A.true,<span>D. Tactical immersion
</span>
Answer:
a. Password length, password encryption, password complexity
Explanation:
Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.
C. She would have to resort to trial and errors to find a matching exponent
Answer:
Transport layer
Explanation:
The transport layer is responsible for maintaining end to end communication between devices connected on a network.
The TCP/IP determines how data is exchanged between devices connected on a network by providing end to end communications that determines how it should be broken into packets.