1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eimsori [14]
3 years ago
8

The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configura

tion to a remote location in an encrypted file. You access the router configuration interface from your notebook computer by connecting it to the console port on the router. You've configured the management interface with a username of admin and a password of password. What should you do to increase the security of this device
Computers and Technology
1 answer:
ZanzabumX [31]3 years ago
4 0

Explanation:

the best thing to do is to create a personal password with a two time passcode for better security of the device

You might be interested in
1. A(n) ____ is a special type of inline image in which you define one or more areas as hotspots. *
3241004551 [841]

<span>1.       </span>Image map

Typically, web pages use different types of inline images. An image map defines one or more areas as hotspots and is a special type of inline image. For instance, every hotspot in an image map is able to link to a different page.


<span>2.       </span>Headings

Once the Web page structure is set, you can now enter content of the web page informational text paragraphs and headings. Headings separate text or add new topics on the page. Headings are indicated by the tags <h1> all through to <h6>


<span>3.       </span>Deprecated tags

<span>By default, W3C supports 3 document types for XHTML HTML, frameset, transitional, and strict. Strict is specified when you want to illegalize use of deprecated tags. Deprecated tags are tags that W3C has earmarked for eventual removal from their specifications because these tags have been replaced by much more newer and functional tags.
</span>
<span />

<span>4.       </span>Frameset document type

As mentioned above in question 3, W3C supports 3 document types for XHTML HTML, frameset, transitional, and strict. Frameset document type is used to support frames on a page and allows the use of deprecated tags.


<span>5.       </span>Definition list

Definition list is an example of a list that offsets info in a dictionary like style. They are not often used as compared to unordered and ordered lists and are important in creating a glossary like list of definitions and items.

6.       Virus.

A virus is a malicious software code that multiplies and replicates by copying itself to another application, document, boot sector and changes how a computer should operate. Typically, a computer virus cannot reproduce without programming a document or a file.


<span>7.       </span>Width Attribute

This attribute specifies the width of an image and the height specifies the height of an image. Both are measured in pixels and the value must always be in pixel. It specifies the width of a cell attribute and is used to set a predefined width of a cell.


<span>8.       </span>Alt attribute

Commonly used with the <img> tag, the alt attribute specifies an alternate image or text, if the image is not in a position to be displayed. The required alt attribute provides info of an image if a user for known or unknown reasons cannot view it.


<span>9.       </span>Color property

It defines the text for an HTML element. It is specified by the color name, a HEX value and an RGB value. The most common ways amongst these three is the HEX value. You can also use color name by replacing the HEX code with the name of the color.


<span>10.       </span>Source Code

Source code is that HTML code which is translated into a graphical web page by a browser. It is possible to view the source code for any page from within the web browser. Using this feature,  it can help one check his or her own code or for another developer.











6 0
3 years ago
Vector graphic is usually required more storage space than bit maps true or false
barxatty [35]
The answer is false
5 0
3 years ago
People express more. often through the ___. language than written language
Oxana [17]
Verbal language because somebody's verbal words are more receptive then ones written word
5 0
4 years ago
Read 2 more answers
What automatically created subdomain holds all the SRV records for Microsoft-hosted services, such as the global catalog, LDAP,
nevsk [136]

Answer:

The correct answer to the following question will be "_msdcs".

Explanation:

Msdcs directory known as Microsoft Domain Controller Catalog requires SRV documents that are used to identify domain controller for certain operations.

  • It automatically generated subdomain keeps all Microsoft-hosted resources SRV data, so it's the correct answer.
  • It includes common SRV documents, documents of LDAP, documents of Kpass, CNAME, etc.
7 0
4 years ago
Firewalls are categorized into two; namely hardware firewall and software firewall. Identify the correct statement for a softwar
garri49 [273]

Answer:

Option (d) Software firewall is placed between the normal application and the networking components of the operating system

Explanation:

  • Software Firewalls protect the computer from trojans and malicious content which can arise from unsafe applications.
  • It also protect the computer from external network.
  • It filters the data to and from a software application in the desktop.
  • It also filters the data to and from a network.
  • It safeguards the computer from not loosing access to the attackers.
  • It is customizable software and has to be monitored like installing updates and storage spaces etc.
  • Software Firewall in conjunction with the Hardware Firewall must be used for the security of the desktop and the networks.
5 0
3 years ago
Other questions:
  • Given the list my_list containing integers, create a list consisting of all the even elements of my_list. Associate the new list
    12·1 answer
  • 1.2 Data transmission speed.Unit of measurement used to measure in bits per second.1000 bits per second (bps)=
    11·1 answer
  • What ip address cidrs are not allowed to be communicated with by our malware?
    15·1 answer
  • What strategies do you use to better understand difficult reading material? Check all that apply.
    5·1 answer
  • Me Completan Pliiiis
    11·1 answer
  • Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
    13·1 answer
  • What are some potential challenges that society will face given the digital revolution? You may want to think particularly of th
    10·1 answer
  • Define a function OutputValues() that takes two integer parameters and outputs all integers between the first and the second par
    15·1 answer
  • Trademarks _____.
    12·2 answers
  • If you click on repeat header rows what will happen?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!