Answer:
- limitation and control of network ports, protocols and services.
- Continuous vulnerability assessment and remediation.
Explanation:
The TCP or transmission control protocol is a layer 4 protocol (transport), that reliably transports packets in sequential segments to an application in the destination computer, using the ip address and the port number of the application.
The ICMP sent during the TCP/ip activities, can render the network vulnerable to attacks. limitation and control of the network ports, protocols and services and continuous assessment would mitigate the vulnerability of the TCP/ip model.
The hard disk drive, OR HDD Stores all the information on the computer.
Answer:
Search for something that fits her needs
Explanation:
There are several approaches to problem solving, the approach that will be employed depends on our definition of the problem. Not all processes can be modeled by mathematical equations, some processes are simply theoretical and can be explained by simple logic.
If Allison does not find the needed equations among the available default equations, she can come up with an equation that addresses the process at hand. If she cannot come up with any, she can use other approaches that fit her needs to explain the required concept to the team.
In java...
public boolean checkSquare(int n){
int actualNumber = n;
int squareRoot = (int)Math.sqrt(n);
int squaredNumber = Math.pow(squareRoot,2);
if(squaredNumber==actualNumber){
return true;
} else {
return false;
}
}
Answer:
26
Explanation:
I just know it ok; rjkhshwnwjk