1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Feliz [49]
3 years ago
14

A network administrator needs to protect a router against brute force login attempts. What is the correct login-block-for comman

d syntax to disable login for 3 minutes if more than 3 failed attempts are made within a 2 minute period?
Computers and Technology
1 answer:
BlackZzzverrR [31]3 years ago
4 0

Answer:

The correct answer is by login the block-for 180 attempts 3 within 120 it protects a router against brute force login attempts.

Explanation:

  • The brute force login attempt is the type of attack in which the attacker  try to put the many passwords in the login window. It put many passwords by guessing them. In the Brute force login attempt the attacker checking all the possible passwords.  
  • The network administrator protects the router by login the block-for 180 attempts 3 within 120. This login block protects a router against brute force login attempts.

You might be interested in
If you were at the front of a long line of people, stepped onto a chair and took a
WINSTONCH [101]
They are closer to the people and they work than a senior management
7 0
3 years ago
PLEASE HELP! WILL MARK AS BRAINLIEST!
insens350 [35]

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the HTML tag

Explanation:

6 0
3 years ago
Read 2 more answers
Which cell contains an absolute reference?
Softa [21]

Answer:

An absolute cell reference is a cell address that contain a dollar sign $ in row and column coordinate or both. We use absolute reference to keep row and column constant

Example: C5*$C$2

The reference to C2 is absolute and will not change when copied.

5 0
3 years ago
G=D+(A+C^2)*E/(D+B)^3 Rewrite the above formula in terms of doing concurrent processing using cobegin and coend to identify thos
jeka57 [31]

Answer:

G=D+(A+C^2)*E/(D+B)^3

p1:C^2

p2:(D+B)^3

p3:A+p1

p4:E/p2

p5: D+p3+p4

COBEGIN

P1(p1,p2)

COEND

COBEGIN

P2(p3,p4)

COEND

execute p5

Explanation:

P1, P2 are parallel processes as they are independent of each other. And p5 together with P1, P2 forms the serial list of processes, and these must be executed serially.  And we need to run as mentioned above concurrent processes under cobegin and coend. Hence the above is the required list of processes and how they are processed. Concurrent processes are listed under cobegin and coend.

4 0
3 years ago
Prior to the introduction of the Internet and Web, the secure communication of proprietary information in business-to-business e
ss7ja [257]

Answer: Option (B) is correct.

Explanation:

Electronic Data Interchange also known as the EDI is referred to as the the electronic exchange/interchange of business information and data using standardized format, i.e. a process under which an organization sends information and data to another organization electronically instead of using paper. Business organization and several other entities that tends to conduct business electronically known as trading partners.

3 0
3 years ago
Other questions:
  • Keion works as a freelancer creating websites and designing logos for clients. He recently had a hard drive failure and lost wor
    7·1 answer
  • Please help!!!!<br> Data means only facts. <br> A. TRUE B. FALSE
    14·1 answer
  • after turning the volume all the way up on the speakers, you still cannot hear any sound. which of the following should be your
    9·1 answer
  • Why can black holes not be seen?
    5·1 answer
  • Computer security:
    15·1 answer
  • Write a method that takes in a String and returns a new
    15·1 answer
  • Select the correct answer
    5·2 answers
  • 1 _ A Unit of information containing the object's position: rotation, and scale values is called:
    10·1 answer
  • Match each item with a statement below.
    8·1 answer
  • Think about how you view your emails—either the email service you use yourself or an email service you would choose to use. Desc
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!