1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
3 years ago
6

Which two tasks are associated with router hardening? (choose two.)?

Computers and Technology
1 answer:
nexus9112 [7]3 years ago
8 0

Disabling unused ports and interfaces.

Securing administrative access.

Router hardening means that the router is secured against attacks as best as possible. Router hardening is one among the three areas of router security that must be maintained to secure an edge router at the network perimeter. Basically, router hardening secures from tough-to-crack passwords, to the shutting down of unnecessary interfaces, ports, and services. Look for any unused router interfaces and disable them by issuing the shutdown command. Disabling unused services typically include BOOTP, CDP, FTP, TFTP, PAD, and a few others. You can also disable administrative and management protocols currently not being  like HTTP or HTTPS, DNS, and SNMP.

You might be interested in
Which of the following is an example of a problem that could be attributed to poor ergonomics?
Alenkasestr [34]

I would say B because Carpal tunnel syndrome is caused by repetitive flexing and extending of tendons (it gets worse if it's for a long time) pressure on the median nerve can cause pain numbness and weakness in the hand and wrist. So this is the best answer as it shows there is a poor working environment it would be better if there was something as simple as a mouse pad that the wrist could lay on while using the mouse for example or using padding on the desk could improve the working environment and prevent this.

4 0
3 years ago
Please tell me the answer
777dan777 [17]

Answer:

Here is an image for that.

Explanation:

I hope it'll help.

6 0
3 years ago
Find each of the following products using distributive property a) 735 × 16​
Alekssandra [29.7K]

Answer:

735 * 16 = 11760

Explanation:

Given

735 * 16

Required

The product using distributive property

Express 16 as 10 + 6

735 * 16 = 735 * (10 + 6)

Distributive property states that:

a * (b + c) = a * b + a * c

So, the expression becomes

735 * 16 = 735 * 10 + 735 *6

Evaluate each product

735 * 16 = 7350 + 4410

735 * 16 = 11760

8 0
3 years ago
____________ describes major components that comprise a system, their relationships, and the information the components exchange
inysia [295]

Answer: Software Architecture

Explanation:

Architecture of a software depicts the basic structure of a software system. Software architecture also describes how the structure of a system behaves and creates such structures, where each structure is consists of software components, relations between these components and the characteristics of these components and relations. It gives an abstraction of a system while hiding its implementation details. It provides description about how the elements of a system interact with each other. For example Service Oriented Architecture (SOA) is a software architectural approach in  which the different application components provide services to other components over the network. IT is a collection of services that communicate with each other. These services integrate into distinct software systems which belong to different business domains.

3 0
3 years ago
What single awk command can be used to display all the login names and their associated numerical user IDs
Luden [163]

Answer:

Used the command syntax; awk -F":" '{ print "username: " $<number location> "\t\tuid:" $<number location> }' <target folder>

Explanation:

Linux operating system is a fast open-source computer platform for programmers and network administrators. Its system is arranged in a hierarchical tree structure with the root represented as "/" (for absolute path).

The passwd is a folder in the Linux OS that holds the login details of all users in the system network. The 'awk' is one of the commands used to get information from a file in a folder. It prints out the result by specifying the location of the values (like the username and user id) as a variable (with prefix '$') and then the target folder.

8 0
3 years ago
Other questions:
  • How can improving one’s reasoning skills also improve one’s performance on the job?
    12·2 answers
  • What is the purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command?
    8·1 answer
  • Does the brain play a role in smartphone addiction
    7·2 answers
  • Semantic search engines use NLP, contextual cues, synonyms, word variations, concept matching, specialized queries, and other st
    6·1 answer
  • Which skill type refers to the ability to interact and communicate effectively with people? skills refer to the ability to inter
    8·2 answers
  • A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
    10·1 answer
  • How to beat level 50 in give up robot 2
    5·1 answer
  • What would be a social networking page background for Sigmund Freud?
    15·1 answer
  • A network device that is used to connect multiple devices together without segmenting a network is a __________.
    10·1 answer
  • What does playstation network is currently undergoing maintenance?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!