1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dovator [93]
2 years ago
7

SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long bee

n used by hackers to gather great amount of information about remote hosts. Which of the following features makes this possible?
a. It used TCP as the underlying protocol.
b. It uses community string that is transmitted in clear text.
c. It is susceptible to sniffing.
d. It is used by all network devices on the market.
Computers and Technology
1 answer:
masha68 [24]2 years ago
6 0

Answer:

b. It uses community string that is transmitted in clear text.

d. It is used by all network devices on the market.

Explanation:

SNMP is an acronym for Simple Network Management Protocol and it is a standard protocol which allows network administrators to manage network devices and client computers remotely.

SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long been used by hackers to gather great amount of information about remote hosts.

The SNMP agent on a network device such as a router authenticates any SNMP Get requests that are being received from the network management software (NMS) using either the read-write or read-only community string.

The features which makes this possible are;

I. It uses community string that is transmitted in clear text.

II. It is used by all network devices on the market.

You might be interested in
In Python, while loops will repeat during the time the test condition is true.
frez [133]

Answer:

It is true

Explanation:

3 0
2 years ago
Read 2 more answers
Marty uses a customized database to sort parts and track inventory. The customized database is an example of _____.
Alexeev081 [22]

cataloging is a term for that

5 0
3 years ago
What are the three primary separation of concerns on the client-side of a dynamic web application? (Check all that apply)
nlexa [21]

Answer:

Behaviour

Style

Structure

Explanation:

Above are the three primary separation of concerns for a web application at client side.

Structure --> we can define the structure of the application at client side using HTML

style-->style is used to give some styling information like font,color,headings so on at client side .In general we use CSS to do this at client side

Behaviour--> it actually defines the functionality of the elements at client side like when we click button what it should do.We will use JavaScript to define the behaviours at client side

7 0
3 years ago
What is Selection statement?​
Sati [7]

Answer:

Selection statements (sometimes called conditional statements) can be defined as code (statements) that is executed only when a certain condition is satisfied.Selection is a powerful tool to control when and which code statements will run.

3 0
2 years ago
Read 2 more answers
We have an internal webserver, used only for testing purposes, at IP address 5.6.7.8 on our internal corporate network. The pack
lukranit [14]

Answer:

Check the explanation

Explanation:

A packet filter firewall is used as a check point between internal corporate network to the outside internet. It blocks all the inbound traffic from the outside hosts trying to initiate a direct TCP connection to the internal corporate webserver. The network design with firewall is shown in the attached image below:

The figures in the attached image below shows an internal corporate network is protected with a packet filter firewall to minimize the inbound traffic from the external network or an internet. Therefore, the packet filter is used as a check point between the network.

The packet filter blocks all attempts by the outside hosts in order to initiate a direct TCP connection to the internal webserver of the internal corporate network.

Going by the second part of the attached image below can can therefore conclude that:

• Rule 1 specifies that, deny any packet with the destination address 5.6.7.8 if the STN flag of TCP header is set.

• Rule 2 specifies that, allow the inbound email traffic from the external source.

• Rule 3 specifies, allows the Outbound TCP traffic from the internal corporate network.

• Rule 4 specifies, allows outbound Email traffic from the internal corporate network to the external network.

• Rule 5 specifies, block any traffic from any source to the any destination.

3 0
3 years ago
Other questions:
  • Only the _________ can add users with passwords and limit user access to selected areas.
    5·1 answer
  • The main differences between laptops and desktop computers other than size and portability.
    14·1 answer
  • 1.where should the name of the website or company logo appear on a website
    5·2 answers
  • This type of software works with end users, application software, and computer hardware to handle the majority of technical deta
    12·1 answer
  • What methods would you add to make this class declarationvery useful?
    11·2 answers
  • Which type of image format is constructed using proportional formulas rather than pixels? This task contains the radio buttons a
    12·2 answers
  • Tell me the most scariest website you know and i'll give you brainlest
    5·1 answer
  • In this exercise, you will get some practice with the __add__ method by implementing it for a class called ContactBook. This cla
    12·1 answer
  • On start up, which of these windows is not displayed ?
    15·2 answers
  • To speed up data retrieval, more vehicles will be upgraded to cellular connections and be able to transmit data to the ETL proce
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!