1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
3 years ago
6

Which two tasks are associated with router hardening? (choose two.)?

Computers and Technology
1 answer:
nexus9112 [7]3 years ago
8 0

Disabling unused ports and interfaces.

Securing administrative access.

Router hardening means that the router is secured against attacks as best as possible. Router hardening is one among the three areas of router security that must be maintained to secure an edge router at the network perimeter. Basically, router hardening secures from tough-to-crack passwords, to the shutting down of unnecessary interfaces, ports, and services. Look for any unused router interfaces and disable them by issuing the shutdown command. Disabling unused services typically include BOOTP, CDP, FTP, TFTP, PAD, and a few others. You can also disable administrative and management protocols currently not being  like HTTP or HTTPS, DNS, and SNMP.

You might be interested in
Trish has bought a new computer, which she plans to start working on after a week. Since Trish has not used computers in the pas
Nikolay [14]

Answer:

The answer is C

Explanation

She should sign an annual maintenance contract (AMC) with her vendor

3 0
3 years ago
Read 2 more answers
What process sends ones and zeroes across network cables
sergejj [24]

Answer:

modulation

Explanation:

Modulation is the procedure of encoding data into electrical signals for transmission through a media. For transmission, binary information, denoted by a sequence of ones and zeros, should be translated to analog or digital electrical signals. The method converts data into electrical signals suited for transmission is known as modulation.  Digital modulation is the transmission of binary signals zeroes and ones.

5 0
1 year ago
Mrs. Johnson is here today to receive an intercostal nerve block to mitigate the debilitating pain of her malignancy. Her cancer
Furkat [3]

Answer:

The correct answer is:

a. M54.6, C79.51, C80.1

Explanation:

-  M54.6 Pain in thoracic spine. It is a billable/specific ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes. The 2020 edition of ICD-10-CM M54.

- C79.51: Secondary malignant neoplasm of bone, it is a billable/specific ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes.

- G89. 3 is a billable/specific ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes. The 2020 edition of ICD-10-CM G89.

Malignant neoplasm of anus, unspecified

Neoplasm related pain (acute) (chronic)

Pain in thoracic spine. M54. 6 is a billable/specific ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes. The 2020 edition of ICD-10-CM M54.

Malignant (primary) neoplasm, unspecified

- C80. 1 is a billable/specific ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes. The 2020 edition of ICD-10-CM C80.

5 0
3 years ago
What is cloud storage?
Lana71 [14]

in cloud storage we can save data online

8 0
3 years ago
Read 2 more answers
A = [2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 33 34 35 36 37 38 39 40]
vova2212 [387]

Answer:

C = a./b

Explanation:

In MATLAB, the following command:

C = A./B

Performs the element by elemet division of A and B. This comand is called Right-array division.

So, in your case, we could divide A by B element by element, only using fully-vectorised code (ie. no loops), with the following code:

a = [2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 33 34 35 36 37 38 39 40];b = [1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 43 45 47 49 50 54 59 60];C = a./b;

C would be the element by element division of A and B, with no loops.

5 0
3 years ago
Other questions:
  • Select the correct answer.
    6·1 answer
  • What is process equipment?
    12·1 answer
  • Driving while wearing headphones or earphones
    12·2 answers
  • Where should you look to find contact information about a company? I. on the company website II. at your local library III. in t
    11·2 answers
  • Which access object(s may be used when creating a lookup field to select valu?
    8·1 answer
  • Edie wants to visit her university's website. What software application should she use?
    9·2 answers
  • In the computer science industry, the process of finding and removing errors from computer hardware or software is known as
    7·1 answer
  • 3. Which swim_backwards method is called when sammy.swim_backwards() is executed? Why?
    8·1 answer
  • What is it called when a programmer includes a step in an algorithm that lets
    5·1 answer
  • Suppose a program is operating with execution-time binding and the physical address generated is 300. the relocation register is
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!