Posts

Showing posts with the label firewall

नवीन पोस्ट..

Rubik's cube and Megaminx for beginners

Image
   Rubik's cube and Megaminx for beginners What You will Learn :- An easy, structured way of learning to solve Rubik's cubes from 3x3x3 to any NxNxN, and the megaminx as a bonus! Who this course is for :-     Begginer of   Rubik's cube and Megaminx GET ON UDEMY JOIN OUR TELEGRAM CHANNEL 

Mathematics: Completing the square |. Microsoft Office Complete Course | All in one MS Office

Image
 Mathematics: Completing the square Mathematics: Completing the square What You will Learn :- Completing the square: how it is done and why the method works (variants for 1, 2, and 3 variables); a geometric illustration of the method and its name. Completing the square in one variable for solving quadratic equations with help of the discriminant and the quadratic formula; derivation of the formula. Completing the square in one variable for plotting polynomials of second degree with help of graph transformations of the parabola y=x^2; finding new vertex. Who this course is for :-     Mathematics from high school to      university GET ON Udemy JOIN OUR TELEGRAM CHANNEL 

Internet Threat Perspectives Quiz Answers NSE 1 Information Security Awareness Fortinet

Image
  Internet Threat Perspectives Quiz Answers NSE 1 Information Security Awareness  Fortinet Question 1: Select two good travelling habits for protecting your portable device. (Choose two.) • Avoid Joining unknown Wi-Fi networks • Join only Wi-Fi networks from recognizable brands, such as starbucks • Turn off automatic security software updates • Encrypt all sensitive data Question 2: You receive an email from your bank. It states that someone has your password and that you must take immediate action by clicking the link provided.What should you do? • Click the link and change your password. Time is of the essence • Scour the emal for speling mistakes, if there are none, then the email is legitimate and you can dick the link. • Delete and report it to the bank by using the contact information found on their website. • Reply to the email to confirm that they have the correct account by providing your bank account number Question 3: Which precaution should you take if you r...

Password Perspectives Quiz Answers NSE 1 -Part 2 | Information Security Awareness Fortinet

Image
    Password Perspectives Quiz Answers NSE 1 -Part 2   |  Information Security Awareness Fortinet     Password Perspectives Quiz Answers NSE 1 - Part 1 

Password Perspectives Quiz Answers NSE 1 - Part 1 |

Image
Password Perspectives Quiz Answers NSE 1 

Internet Threat Perspectives Quiz Answers NSE 1 Information Security Awareness Fortinet

Image

Learn Basics to Advance level of stock market

Image
Learn Basics to Advance level of stock market Description :- In this course you will learn Basics to advance level of Stock market in a practical manner ,when I was a beginner in the stock market I have read many books but it doesn't bring much change in my trading In this course you will learn what and why is stock market what is stock exchange what is index what is technical and fundamental analysis who are market participants types of markets short selling GET ON DEMY JOIN  OUR  TELEGRAM GROUP .

Python Hands-On 46 Hours, 210 Exercises, 5 Projects, 2 Exams

Image
 Python Hands-On 46 Hours, 210 Exercises, 5 Projects, 2 Exams What you'll learn Learn & Master Programming Fundamentals, Coding Algorithms and Computer Science Concepts. Do exercises on all fundamental topics of Python with 17 Quizzes and 170 Coding Exercises. Build 5 Real-World Project with Python and do 5 Assignments related to these projects. Take 2 Exams on Python; Midterm and Final Exam with 20 questions each. Learn Python Modules and Packages and how to use them. Build Python applications with Anaconda and PyCharm and master them. Build a GUI application with tkinter. Learn all Python you need for Machine Learning, Deep Learning, Data Science and Application Development. Gain solid and profound Python Programming skills needed for a Python career. Requirements The first thing you need is a computer and an internet connection Second, you need to be prepared for doing hundreds of Python coding exercises :) Certificate of Completion Access on mobile and TV Full lifetime acce...

Fortinet NSE 1 Lesson2-CIO Perspectives Quiz

Image
 Fortinet NSE 1 Lesson2-CIO Perspectives Quiz FORTINET. E Certifications NSE 1 Lesson 2 Quiz Answers CIO Perspectives Q: How does implementing multiple security peint products frees multiple vendors affect managing an environment? Select one  Requires fewer staff members. More complicated and more expensive. Saves money on rackspace and cooling costs. Simpler and less expensive. Q2. Internally to the CIO's company, what is the overall impact when a cyber attack caunas extended to d employen time is diverted to post-attack activities? Select one Productivity is reduced . Marale is increased Productivity is increased. Overtime pay is approved. Qs. On average, how can a CIO's tenure be characterized? Select one: CIOs have the longest tenures among C-level executives. The tenure of a CIO is generally stress-free and relaxing. CIOs have the shortest tenures among C-level executives. The tenure of a CIO is a step on the path to CFO. Q4. Regulatory fines related to serious breaches c...

Password Perspectives Quiz Answers Nse 1 Information Security Awareness Fortinet

Image
 Question 1: Which practice should you implement for backups? • Encrypt the backup data for an extra layer of protection. • Keep a backup device physically connected to the host • Use multiple backup vendors for redundancy. • Always back up your data in the cloud. Question 2: Which rule is best to follow for securing passwords? • Use a combination of seemingly random upper and lowercase letters, numbers, and special characters that is easy to remember but difficult to guess. • Never leave your password on a sticky note stuck to your monitor. Instead, hide under your keyboard. • Use something that you would never forget, like the name of your family pet. • Use a predictable pattern of numbers or letters. Question 3: Which two characteristics are examples of poor passwords? (Cho two.) A predictable sequence of numbers or words A commonly used word or unchanged default password A memorable passphrase written as a random sequence of keyboard keys A combination of random letters, numbe...

CCNA Routing basic interview Question and answers Part 2

Image
CCNA Routing Basic Interview Question & Answers Part  2   Q26. Explain what is a source route? Ans. The source route is defined as a sequence of IP addresses that are used to identify the route of a datagram. You can also involve the source route in the IP datagram header.   Q27. What is the difference between ‘standard’ and ‘extended’ ACL (access control list)? Ans. Standard ACLs are source-based, whereas extended ACLs are source- and destination-based.   Q28. What is data encapsulation? Ans. Data encapsulation is the process of breaking down information into smaller, manageable chunks before their transmission across the network.   Q29. What is RAS? Ans. RAS (Remote Access Services) refers to any combination of hardware and software to enable remote access to tools or information that typically reside on a network of IT devices.   Q30. Mention the different network protocols that are supported by Windows RRAS services? Ans. Following are the three mai...

CCNA Routing basic Interview Question and answers Part 1

Image
 What is a Computer Network? ...   A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.  What are the different types of networks? Considering the size or span of a network, we can classify them as follows: PAN (Personal Area Network) – PAN is made up of devices used by a single person. It has a range of a few meters. WPAN (Wireless Personal Area Network) – It is a PAN network that uses wireless technologies as a medium. LAN (Local Area Network) – LAN is a network whose range is limited to a relatively small area, such as a room, a building, an airplane, etc. WLAN (Wireless Local Area Network) – WLAN is a LAN network that uses wireless means of communication. It is a widely used configuration due to its scalability and because it does not require the installation of cables. CAN (Campus Area Network) – A network of hig...

Fortinet NSE 1 Lesson2-CIO Perspectives Quiz

Image
Fortinet NSE 1 Lesson2-CIO Perspectives Quiz |   HOW DOES IMPLEMENTING  multiple security point products from multiple vendors affect managing an environment Select one: Requires fewer staff members. More complicated and more expensive. Saves money on rackspace and cooling costs. Simpler and less expensive. Qz. Internally to the ClO’s company, what is the overall impact when a cyber attack causes extended downtime, and employees’ time is diverted to post-attack activities? Select one: Productivity is reduced. Morale is increased. Productivity is increased. Overtime pay is approved. Q3. On average, how can a CIO’s tenure be characterized? Select one: cios have the longest tenures among c-level executives the tenure of a cio is generally stress-free and relaxing CIOs have the shortest tenures among c-level executives The tenures of a cio is a step on the path to CFO Q4.  Regulatory fines related to serious breaches can be characterized in which way They can be enormous and ...

Fortinet Internet Threat Perspectives Quiz Answers Fortinet NSE 1 Information Security Awareness Fortinet - Everything Trending

Image
  Internet Threat Perspectives Quiz Answers Fortinet NSE 1 Information Security Awareness Fortinet - Everything Trending   Internet Threat Perspectives Quiz Answers NSE 1 Information Security Awareness Fortinet Question 1: Select two good travelling habits for protecting your portable device. (Choose two.)  Avoid joining unknown Wi-Fi networks  Join only Wi-Fi networks from recognizable brands, such as Starbucks  Turn off automatic security software updates  Encrypt all sensitive data Question 2: You receive an email from your bank. It states that someone has your password and that you must take immediate action by clicking the link provided. What should you do?  Click the link and change your password. Time is of the essence.  Scour the email for spelling mistakes. If there are none, then the email is legitimate and you can click the link.  Delete and report it to the bank by using the contact information found on their website.  Reply ...