1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
3 years ago
12

I need help with cisco please

Computers and Technology
1 answer:
Dmitry [639]3 years ago
4 0

A cisco develops, manufactures and sells networking hardware, software, telecommunications equipment and other high-technology services and products. ... They pioneered the concept of a local area network (LAN) being used to connect geographically disparate computers over a multiprotocol router system.

Hope that helps.

You might be interested in
Describe how mendeleev organized the elements into rows and columns in his periodic table.
lyudmila [28]
The way how Mendeleev organized the elements into rows and columns in his periodic table was that he decided to arrange all <span>the elements in rows in order of increasing mass, that will make the elements with similar properties stand  in the same column. Soon he discovered many new elements such as gallium and after that he realized how his periodic system is useful for classification new elements.</span>
7 0
3 years ago
The Cisco IOS automatically modifies the dead interval when the _____ interval is changed. (Points : 2) hello
erma4kov [3.2K]

Answer: MD5

Explanation:

 The Cisco IOS modifying the dead internal automatically when the message digest 5 (MD5) internal are changed in the system. When we enabled the MD5 authentication in the Cisco by using the keyword "Message digest" then we configuring the password in the IP OSPF interface command which is known as MD5 key.

The OSPF interface is a compatible configuration in the remote interface before they considered as neighbors in the Cisco system. The MD5 are basically created by the cisco NX-OS.

5 0
4 years ago
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
kotegsom [21]

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

6 0
3 years ago
4. Select the correct answer.
3241004551 [841]

Answer: B.  PDF

Explanation:

Portable Document Format (PDF) is such an important document that it is considered the international standard for information and document exchange. It is used for letters, resumes and even electronic contracts.

PDF was developed by Adobe to make it independent of the device or application it is being viewed on and combines layers of information into one layer thereby making it a flat document.

7 0
3 years ago
Which group on the home tab contains the line spacing attribute?
Juli2301 [7.4K]

Answer:

The Paragraph group on the Home tab contains commands to set and control several format options for a paragraph. The options include alignment, indentation, line spacing, and pagination. click Ctrl+J to justify. You can indent individual paragraphs so they appear to have different margins from the rest of a document.

Explanation:

comment an let me know how it helps

8 0
3 years ago
Other questions:
  • Which option is referred to by the Animals tag?
    5·1 answer
  • Which of the following is not a typical step in the ethical hacking process? A. Planning B. Discovery C. Attack D. Recovery
    5·1 answer
  • The amount of data produced worldwide is increasing by ___% each year.
    5·1 answer
  • __________ use a challenge response mechanism in which a server challenges a user with a number, which a user must then enter in
    5·1 answer
  • You can change the transparency of a picture used as a slide’s background with the ____.
    10·1 answer
  • Question 4 of 20
    5·1 answer
  • . An access specifier is one of three keywords:
    14·1 answer
  • What is boolean rules​
    12·1 answer
  • Como a contribuido el desarrollo tecnologico a mejorar la calidad debida de los seres humanos
    11·1 answer
  • The getElementById DOM Method do?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!