Answer: Medium Dependent Interface Crossover (MDIX)
Explanation:
The technology that is typically implemented on switches to avoid Ethernet connectivity problems is Medium Dependent Interface Crossover(MDIX) For switches with Auto (MDIX) the connection is configured automatically and a crossover or straight-through cable can be used to connect two switches. When this MDIX interface is connected it corrects the connectivity speed and the cabling for proper device functionality.
Answer:
An employee is having trouble opening a file on a computer.
- → ✔ <u>information services and support</u>
The president of a company wants to give the company website a fresh new look.
- → ✔ <u>interactive media</u>
An employee wants to work from home but can’t connect to the network from there.
- → ✔ <u>network systems administration</u>
The vice president of sales would like help designing a new software program to keep track of sales.
- → ✔<u> programming and software development</u>
<u>OAmalOHopeO</u>
Answer:
All of them execpt five and three.
Explanation:
It is okay to have social media and receive messages.
There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.
Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.
They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software
Learn more from
brainly.com/question/14728460