1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Slav-nsk [51]
3 years ago
8

What will happen when users attempt to connect via Telnet or SSH for enable mode when neither the enable secret password command

nor the enable password command has been configured?
Computers and Technology
1 answer:
vovikov84 [41]3 years ago
6 0

<u>Attempt to connect via Telnet or SSH for enable mode:</u>

  • Normally telnet and SSH ism to used login to network socket. Basically to login user is prompted with password and verified.
  • Secret password is one more level to login to access the network.
  • It is used to login copy files to web server so that website pages are update. End user can copy or move the files from web server or cloud computer or UNIX servers.
  • Enable secret password if it is configured, end user login with encrypted technology and plain text format is displayed.
  • Different between enable secret and enable password is enable secret is encrypted and enable password is not encryption and plain text.
You might be interested in
Sql injections is an attack in which __ code is inserted into strings that are later passed to an instance of sql server.
jek_recluse [69]

Answer:

malicious code

Please Mark Brainliest If This Helped!

7 0
2 years ago
Modify an array's elements using other elements Write a for loop that sets each array element in bonusScores to the sum of itsel
Igoryamba

Answer:

The program to this question can be given as:

Program:

#include<stdio.h>  //header file.

int main()

//main function

{

  int i;  //define variables.

   int bonusScores[]={10,20,30,40};  //define array.

   printf("Values:");  //message

  for (i = 0; i < 4; ++i)  //loop for print values.

{

printf("%d ", bonusScores[i]);

}

for (i = 0; i <4; i++)   //loop for convert values

{

      if (( bonusScores[i] <= bonusScores[i +1] ) || (bonusScores[i] < bonusScores [i+1]))  //check array elements

       {

          bonusScores[i] = (bonusScores [i] + bonusScores[i+1]);   //add values

      }

      else

{           bonusScores[i] = bonusScores[i];

     }

   }

   printf("\nReturn values:");  //message

   for (i = 0; i < 4; ++i) //loop for print values

  {

      printf("%d ", bonusScores[i]);      //print values

  }

  printf("\n");

return 0;

}  

Output:

Values:10 20 30 40  

Return values:30 50 70 40  

Explanation:

In the above c++ programming code firstly we define the header file. Then we define the main function in this function we define variable that name is given in the question that is i. Variable i is used in the loop for a print array. Then we define and initialize an array. The array name is and elements are define in the question that is bonusScores[]={10,20,30,40}. Then we use the loop for print array elements. We use the second time in this loop we check array elements by using the condition statements in if block we add the elements and in else we print last value. At the last, we use the loop for print array.

5 0
3 years ago
In Florida refusal to submit to testing (first offense) results in
Varvara68 [4.7K]
A fine, or put on watch list usually
8 0
3 years ago
?Which programmer designs programs for applications executed on the Internet?
fomenos
Web programmer hoped that helped and good luck (:
3 0
3 years ago
Read 2 more answers
Hi I m from India plz follow me and I will follow u​
erma4kov [3.2K]

Answer:

pok

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which technology is used to uniquely identify a wlan network?
    14·1 answer
  • To what does the term computer hacking refer?
    10·2 answers
  • PLEASE HELP GIVING 25 POINTS Sophia is leading a project to help clean up a local river in her area. She creates an online forum
    9·2 answers
  • The body element is where you provide browsers with information about the document
    12·1 answer
  • A magnetic disk drive requires a motor to position a read/write head over tracks of data on a spinning disk, (see fig. e4.4 in d
    8·1 answer
  • A hardware compatibility list recommends striping with double parity as storage for an application. In a test environment, a tec
    13·1 answer
  • The names of the governing body or organizationds that creates rules for information technology and information communication te
    9·1 answer
  • Please tell fast plzzzzzz​
    5·2 answers
  • Match each operating system drawback to its respective operating system.
    15·2 answers
  • With software prefetching, it is important to be careful to have the prefetches occur in time for use but also to minimize the n
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!