1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dovator [93]
3 years ago
7

SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long bee

n used by hackers to gather great amount of information about remote hosts. Which of the following features makes this possible?
a. It used TCP as the underlying protocol.
b. It uses community string that is transmitted in clear text.
c. It is susceptible to sniffing.
d. It is used by all network devices on the market.
Computers and Technology
1 answer:
masha68 [24]3 years ago
6 0

Answer:

b. It uses community string that is transmitted in clear text.

d. It is used by all network devices on the market.

Explanation:

SNMP is an acronym for Simple Network Management Protocol and it is a standard protocol which allows network administrators to manage network devices and client computers remotely.

SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long been used by hackers to gather great amount of information about remote hosts.

The SNMP agent on a network device such as a router authenticates any SNMP Get requests that are being received from the network management software (NMS) using either the read-write or read-only community string.

The features which makes this possible are;

I. It uses community string that is transmitted in clear text.

II. It is used by all network devices on the market.

You might be interested in
If you are creating a new document that you know will be turned into a Web page, it is a good idea to start in _____.
Lina20 [59]
I think you should start in Web layout
7 0
3 years ago
A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code
Maslowich
A Cryptographich hash is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.
3 0
3 years ago
A corporate user is attempting to connect to the company’s Windows domain server on the local network with her new laptop throug
andreev551 [17]

Answer:

B. Windows domain user name and password

Explanation:

Windows domain user name and password are login credentials required for the user to successfully sign in to the Windows domain.

The domain username and password are usually stored on a domain controller rather than on the host.

As a domain user, the computer seeks from the domain controller the privileges assigned to the user, if it gets a positive response from the domain controller, it authorizes the users login credentials without restrictions; else, it denies the user access.

8 0
4 years ago
Why when I send a message on iOS it says the person’s notification is silenced, and the message isn’t delivered?
Leto [7]

Answer:

This is because the other person has "Focus Mode" turned on. When this is turned on, all of your messages that you send to him/her will be silenced.

4 0
3 years ago
Today encoding scheme has taken over ascII by what
harkovskaia [24]
I do not know, i really hope you dont fail!!!!!!!!!
7 0
4 years ago
Other questions:
  • The home page box will only appear with what people you may know
    12·1 answer
  • What are the desirable qualities of a Product Vision?
    11·1 answer
  • Transistor was the major technology used during the ____ generation of hardware.
    5·1 answer
  • Hazel has just finished adding pictures to her holiday newsletter. She decides to crop an image. What is cropping an image?
    5·1 answer
  • . In many instances an IP address is used to access a server rather than a URL because a URL is more difficult to set up and eas
    10·1 answer
  • LEAF library in py can be expressed in what form?
    6·1 answer
  • QUESTION 4 of 10: True or false: Paying for your ticket to a rock concert instead of a gym membership is an example of Opportuni
    9·1 answer
  • When you open your word-processing program, it opens in a<br> field<br> menu
    9·2 answers
  • Who wrote Hamlet? <br><br>Brainliest for the right answer​
    12·2 answers
  • When viewing an e-book section of an assignment in launchpad, you can return to your main course page at any time by clicking th
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!