1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
3 years ago
6

Which two tasks are associated with router hardening? (choose two.)?

Computers and Technology
1 answer:
nexus9112 [7]3 years ago
8 0

Disabling unused ports and interfaces.

Securing administrative access.

Router hardening means that the router is secured against attacks as best as possible. Router hardening is one among the three areas of router security that must be maintained to secure an edge router at the network perimeter. Basically, router hardening secures from tough-to-crack passwords, to the shutting down of unnecessary interfaces, ports, and services. Look for any unused router interfaces and disable them by issuing the shutdown command. Disabling unused services typically include BOOTP, CDP, FTP, TFTP, PAD, and a few others. You can also disable administrative and management protocols currently not being  like HTTP or HTTPS, DNS, and SNMP.

You might be interested in
Which of the following is not a reason that the subject line should never be left blank?
bija089 [108]

the email may not be transmitted without that information (apex)

7 0
3 years ago
Read 2 more answers
Windows server 2012 r2 supports two types of folder shares. what are those two types?
larisa [96]
<span>Windows server 2012 r2 supports the following two types of folder shares: </span>Network File System and Server Message Blocks. Correct answer: D
Network File System<span> (</span>NFS) is a distributed file system protocol for <span>storing and updating files on a remote computer. </span>
The Server Message Block<span> (SMB) Protocol is a </span>network file sharing protocol.
7 0
4 years ago
Help a fellow coder and anser these 5 questions
BlackZzzverrR [31]

Answer: yes because it helps

Explanation: it shows everything

4 0
3 years ago
X=10 ;
NNADVOKAT [17]

Answer:

The answer is x=10; y=15;

There is no change in the values of the variables x and y.

Explanation:

The integer variables x and y are initialized to 10 and 15 respectively as given.

x=10 ;

y=15 ;

The values of variables x and y are passed as parameters to another method, as shown.

mystery (x, y);

The mystery method given in the question is used to assign the same value to both the variables. The value of both the variables hold the value of x, i.e., both the variables hold the value of 10.

void Mystery ( int one , int two )  

{  

// temporary

int temp;  

// temp initialized to value of variable one which contains the value of variable x

// temp = x or temp = 10

temp = one;

// one is initialized to the value of itself or value of x

// one = x or one = 10

one = one ;

// temp is assigned value of variable x through variable one

// temp = 10

// y is also assigned value of temp variable

// y = 10

two = temp;  

}

As shown in the above steps, the mystery method is used to assign same values to variables one and two.

The values of original variables x and y are not affected since x and y are not utilized or called inside the mystery method.

This type of passing of parameters to a method can be described as passing a copy of the values of the parameters to the method.

Value of variable x is passed into variable one while value of variable y is passed into variable two.

Hence, values of variables one and two can be changed and modified without affecting the values of original variables x and y.

3 0
3 years ago
Whats the task of one of the computers in network called?
pentagon [3]
The answer that’s gonna be followed is a:hardware server I’m sure
3 0
3 years ago
Read 2 more answers
Other questions:
  • What is the primary limitation of free versions of antivirus applications
    14·1 answer
  • What term identifies hard drives enclosed in a case other than your computer's case? A External hard drives B Flash drives C CD-
    8·2 answers
  • ____________________ software is a type of security software designed to identify and neutralize web bugs, ad-serving cookies, a
    8·1 answer
  • Why do the holes at the top of parachutes make it go slower
    12·1 answer
  • C++ what is wrong with my equation?
    10·1 answer
  • When using a function to preform a calculation how would you select the range of numbers to use
    13·1 answer
  • How many 16-byte cache blocks are needed to store all 64-bit matrix elements being referenced using matlab's matrix storage?
    15·1 answer
  • when using presentation software, which menu can you use to duplicate a slide to use as a template for a new slide?
    14·1 answer
  • What breakthrough in sound recording facilitated stereophonic recording? Ο Α. overdubbing O B. multitrack recording O C. digital
    10·1 answer
  • Technical safeguards involve the hardware and software components of an information system. group of answer choices true false
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!