1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
3 years ago
5

You are the network administrator for a growing business. when you were initially hired, the organization was small and only a s

ingle switch and router were required to support your users. during this time, you monitored log messages from your router and switch directly from each device's console. however, the organization has grown considerable in recent months. you not must manage 8 individual switches and three routers. it's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner.
Computers and Technology
1 answer:
k0ka [10]3 years ago
6 0
Usually, network devices can be set up to send their syslog messages to a syslog server, so you'd just need a *nix computer with syslog setup to receive messages via the network, and you can read stuff there. You also get the advantage of having reglar expressions so that "noise" (messages you don't care about) isn't displayed.

Network devices can also be set up to use SNMP (Simple Network Management Protocol).

You might be interested in
A type of touch screen that can be up to four feet by six feet is a(n) _____.
Llana [10]
Hi,

A type of touch screen that can be up to four feet by six feet is a(n) <span>multitouch interface.
</span>.
7 0
3 years ago
Read 2 more answers
How fast is light? person that answers this will get points ​
Serhud [2]

299,792,458 metres per second

6 0
3 years ago
What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?
AfilCa [17]

Answer:

Explanation:

There are many weaknesses/vulnerabilities, some of which are the following...

Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.

Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.

WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.

These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.

7 0
3 years ago
Central processing unit definition computer
Feliz [49]

The CPU reads machine instructions from program memory and executes them.

4 0
3 years ago
Read 2 more answers
V.kofiryfh givnyovb (to slove you must go back 3 letters)
Elena L [17]
Im goin to be honest with you i dont understand this question at all can you xplain it alittle more plz cuz if i go back three letters it is o
7 0
3 years ago
Other questions:
  • The term ________ refers to the use of a single unifying device that handles media, internet, entertainment, and telephone needs
    13·1 answer
  • La inteligencia o unidad lógica de un computador se denomina como??? Software, Hardware CPU o que, ayuda.....
    7·1 answer
  • The section called Breaking Substitution Ciphers (p. 166) describes a "random substitution cipher," in which each letter of the
    11·1 answer
  • Dana downloads music into her computers random access memory, or ram, without authorization. this is?
    15·1 answer
  • Autumn suffers from nocturnal dyspnea. This term describes a breathing condition but using the prefixes to translate, it means:
    5·1 answer
  • Menus are attached to the windows by calling
    15·1 answer
  • The metric unit used for length
    5·1 answer
  • Which four of the following qualify as fair use?
    11·2 answers
  • Buying a home security system is an example of protecting your home against________.
    5·1 answer
  • This might sound crazy! But please help.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!