Answer:
Option C (DMCA) would be the correct choice.
Explanation:
- DMCA is designed to govern electronic channels and tackle the problems the online revolution confronts regarding copyright.
- DMCA's mission seems to be to accommodate the rights of intellectual property producers and investors and investigate anything other than a copyrighted material that really occurs throughout the digital environment.
The other given choice are not related to the given content. So that option C is the right one.
Answer:
a) 6
b) 11
c) 11
Explanation:
Given
Prime value q =n= 19
primitive root (a) =10
Alice secret key = 4
Bob secret key = 6
a) The value Alice Sends to Bob
aPrivate key of Alice mod n
= 10^4 mod 19
= 10000 mod 19
=6
b)The value Bob sends to Alice
aPrivate key of Bob mod n
= a3 mod n
= 10^6 mod 19
=1000000 mod 19
= 11
c)
Both the parties calculate the value of secret key at their respective side.
secret key obtained by Alice
= 11
secret key obtained by Bob
= 11
Finally, both the parties obtain the same value of secret key.
The value of common secret key = 17
Apply encryption to VM files the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files
f. Apply encryption to VM files.
b. secure the VM files with permissions
<u>Explanation:</u>
Installing anti-malware is a must on each VM OS OR Host OS to protect both servers and hosted workstations.
Scheduling update OS patches and anti-malware and scanning server or host operation are also must.
Securing VM files as best practices better to encrypt and decrypt is the best method or best practices.
Even protected VM files sometimes can be hacked and damaged the VM files.
VM is a virtual machine technology is used in windows 10. Before login decrypts the VM and connects to virtual machines. On disconnected encrypted is safer.
Answer:
There are additional security risks associated with using cloud computing over local data storage.
Explanation:
Cloud computing: The term "cloud computing" is described as a process through which an individual tends to access and store various programs and data over the internet rather than his or her computers' "hard drive". However, the term "cloud" here refers to a specific metaphor associated with the internet.
Types:
1. Software-as-a-service or SaaS.
2. Platform-as-a-service or PaaS.
3. Infrastructure-as-a-service or IaaS.
In the question above, the very first option is correct as all other options mentioned over here are incorrect because they aren't related to cloud computing.