1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
3 years ago
14

What actions can you take to ensure the physical security of network devices?

Computers and Technology
2 answers:
Monica [59]3 years ago
8 0
use vpns, use long hard to figure out passwords, and keep ur devices in sight or reach of you
lawyer [7]3 years ago
3 0

Answer:

Here are some steps you can take to make sure your network is secure:

Take physical precautions. ...

Make sure all of your server's security features are enabled. ...

Use both hardware and software firewalls. ...

Install the latest version of your server's software. ...

Guard passwords. ...

Be Wi-Fi savvy.

Explanation:

PLEASE MARK ME AS BRAINLIEST

You might be interested in
ANSWER ASAP!!! 12 POINTS!!!!! RIGHT ANSWERS ONLY
suter [353]

Answer:

B.

Explanation:

8 0
2 years ago
Read 2 more answers
Inheritance enables an object, called a _____, to derive one or more of its attributes from a parent.
jarptica [38.1K]

Answer:

The answer is C.) child

I hope this helps! ^-^

6 0
2 years ago
Which is the best description of a computer virus?
MatroZZZ [7]
The best description of a computer virus is. Someone first starts out making a malicious program, then can send it to a unexpected user. After that, when the user opens the malicious program, it can do negative things on the target. The virus first starts out in the system32, then infects a random file type for example, exe files, or dlls etc. Then random errors can pop up on the computer saying "YOUR COMPUTER IS UNDER RISK! CALL THIS NUMBER NOW! 555-555-5555" and the options of the error, can direct you to a website, that can give you another virus. To get rid of a virus, you have to ignore the popups that comes onto your computer, and get a strong antivirus like avast, or avg. Then let it scan the system. After when the scan is done, it will show up the virus, and it will give you options "to delete virus or ignore it" you would hit delete. I hope this answer helped you. Let me know if you have any more questions! Thanks!
6 0
3 years ago
Read 2 more answers
Before you start creating a database, you should first use paper to plan, test, and revise. True False
Licemer1 [7]
<span>Before you start creating a database, you should first use paper to plan, test, and revise. True or False?
TRUE</span>
8 0
3 years ago
Read 2 more answers
you have increase the packet size while using color doppler to evlatue flow. what negative result will occur
swat32

Answer:

You have increased the packet size while using color Doppler to evaluate flow. What negative result will occur from this action? Decreased frame rate. You have increased the packet size while using color Doppler to evaluate flow. Hope this helps! PLEASE GIVE ME BRAINLIEST!!!! =)

3 0
3 years ago
Other questions:
  • Which of the following will track every single connection outside the Web by IP address and URL? Clipper Chip National Security
    13·2 answers
  • A car with a 20-gallon gas tank averages 23.5 miles per gallon when driven in town and 28.9 miles per gallon when driven on the
    9·1 answer
  • _________ is critical to Amazon's success.<br><br> SCM<br><br> JIT<br><br> ERP<br><br> VMI
    9·1 answer
  • Use the drop-down menus to complete the statements about creating a table of contents in Word 2016.
    14·1 answer
  • Consider a swapping system in which memory consists of the following hole sizes in memory order: 10 MB, 4 MB, 20 MB, 18 MB, 7 MB
    9·1 answer
  • Write a program get_price.py with a function get_price() that takes a dictionary of fruits as an argument and returns the name o
    6·1 answer
  • What is the binary number 0011 0011 multiplied by two?
    11·1 answer
  • If the fluid level in a battery is below the separators<br> should be added but never add
    5·1 answer
  • The data source in the document which has the information common to all documents. True or false 
    9·2 answers
  • An independent penetration testing company is invited to test a company's legacy banking application developed for Android phone
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!