Answer:
- limitation and control of network ports, protocols and services.
- Continuous vulnerability assessment and remediation.
Explanation:
The TCP or transmission control protocol is a layer 4 protocol (transport), that reliably transports packets in sequential segments to an application in the destination computer, using the ip address and the port number of the application.
The ICMP sent during the TCP/ip activities, can render the network vulnerable to attacks. limitation and control of the network ports, protocols and services and continuous assessment would mitigate the vulnerability of the TCP/ip model.
Answer:
c. Users can have calls forwarded from anywhere in the world
Explanation:
As all you need is the internet, there would be no need to try to sort out roaming as you would on a regular phone line
Answer:
I am doing it with python.
Explanation:
nums = '9 -8 -7 -6 -5 -4 -2 0 1 5 9 6 7 4'
myfile = open('data.txt', 'w')
myfile.write(nums)
myfile.close()
myfile = open('data.txt', 'r')
num1 = (myfile.read())
num1 = num1.split()
print(num1)
print(type(num1))
for x in num1:
x = int(x)
if x < 0:
minus = open('dataminus.txt', 'a')
minus.write(str(x) + ' ')
minus.close()
elif x>= 0:
plus = open('dataplus.txt', 'a')
plus.write(str(x)+' ')
plus.close()
Answer:
Available Options are :
A <b>
B <l>
C <body>
D <small>
Ans : A <b>
Explanation:
Normally AD and BC are written in bold letters.
for example : The terms anno Domini (AD) and before Christ (BC).
Within available option the best option to choose is <b>
The <body> element used to define the document body.
The <small> tag used to defines smaller text
But, the best option to choose is in case if they are using the HTML5 then html <time> element will be used to display BC date and AD dates.
for ex : <time datetime="-314-07-01"
calendar="Ancient Roman">1 July 314 BC</time>
<em>Intrusion means unauthorized and harmful activities happening in your system. Any irregularities in the system is considered as intrusion and therefore monitored by administrators and can be detected using Intrusion Detection System.
</em>
<em>Examples of Intrusion attacks in a network are:
</em>
- <em>Denial of Service (Dos) - denial of service means flooding the system causing it to crash and unable to respond to a service request. Normally, a DoS attack is facilitated by numbers of hosts sending enormous request to a victim computer. The requests can be in a form of code that would flood the system and making it to unresponsive. </em>
- <em>Man in the Middle Attack (MiM) - a hacker would be in the middle of the communication between a client computer and a server computer. The hacker can mimic IPs within the network and steal information then sends it to the intended receiver. </em>
- <em>SQL Injection - For websites that runs database like SQL, a code by the hacker can be added to the website and making him gained access to the database information successfully.</em>