Answer:
1.Communication Management
2.Information Management
Explanation:
NIMS has introduced COMMUNICATION management system that determines if the decision makers has the ways to communicate decisions. It has standards that defines the ways that can be used by the personnel to communicate the decisions in a better and efficient manner.
NIMS has also a system which is primarily introduced to check the the personnel has the information to make and communicate decisions called Information management. Again, it also has the templates that defines that how information should be spread considering the confidentiality of the information.
Answer: wikimedia Commons is your answer
Explanation:
Answer:
In a rule to disallow connection silently, the action you would use is "Drop" (b).
Explanation:
When you use the "Drop" action in a rule, it means that any incoming connection matching the rule will be silently discarded or ignored. The connection will not receive any response or acknowledgement that it has been dropped. This can be useful in scenarios where you want to block unwanted or malicious traffic without alerting the sender.
For example, let's say you have a firewall configured with a rule that drops all incoming connections from a specific IP address. If a connection attempt is made from that IP address, the firewall will simply drop the connection without sending any response back. The sender will not receive any indication that the connection was dropped, which can help protect your network from potential threats.
It's important to note that the "Drop" action differs from the "Reject" (c) action. While "Drop" silently discards the connection, "Reject" sends a response back to the sender indicating that the connection has been rejected. This can be useful in situations where you want to inform the sender that their connection was not allowed.
In summary, the "Drop" action in a rule is used to disallow connection silently. It silently discards incoming connections without sending any response back to the sender.
Answer:tunneling virus
Explanation:
A tunelling virus is a virus that attempts to intercept anti-virus software before it can detect malicious code. A tunneling virus launches itself under anti-virus programs and then works by going to the operating system's interruption handlers and intercepting them, thus avoiding detection.
Answer:
The answer is below
Explanation:
Hazard is something or condition that can cause injury to individuals. If properties are not managed appropriately, the hazard can be inevitable. Every hazard comes with its own risk. And Risk of hazard is the degree to which hazard can affect individuals when exposed to hazards.
Identifying hazards in the surrounding are essential. Also, identifying the risk associated with hazards can't be overemphasized. Hence, the need to identifying both the hazards and the risks associated with it.
There are various reasons it is important to identify risks and hazards inside kitchen and home and business properties. They include the following reasons:
1. It is important to identify hazards in the kitchen, home, and business properties because they may cause injury.
2. Identifying hazards will make us know how to eliminate the hazards
3. When we identify hazards we can easily prevent its future occurrence
4. Identifying hazards in the kitchen such as a bad electric cooker can prevent potential electrical shock
5. When a hazard such as leaking gas is identified, we prevent potential fire outbreak
6. Identifying hazard early is a preventive measure and it is cheaper.
7. Failure to identify hazards in business properties will lead to a great loss of profits.
8. To identify the risk of hazards is the best way to eliminate the hazards.
9. Identifying the risk of hazards can make us anticipate and quickly remove the hazards effectively.
10. It is cheaper to eliminate the risk of hazards when identified than performing repairs after hazards have caused damages.
11. Understanding and identifying the risk of hazard can help save lives, whether kitchen, home, or in business properties.
12. Identifying the risk of hazards, can lead us to have a solution in place against the hazard.