1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
3 years ago
5

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically lo

cated in a server room that requires an ID card to gain access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer by connecting it to the console port on the router. You've configured the management interface with a username of admin and a password of password. What should you do to increase the security of this device
Computers and Technology
1 answer:
djverab [1.8K]3 years ago
5 0

Answer:

  • <u>Change the default administrative user name and password.</u>
  • <u>Use an SSH client to access the router configuration.</u>

Explanation:

<em>Remember</em>, we are told the default username and password were simply, <em>"admin"</em> and <em>"password"</em>. From a security perspective, both the password and username are weak choices. Hence, to increase the security of the notebook computer where the router configuration management interface is found, it is best you change the password.

Next, by using a Secure Shell Protocol (SSH) client to access the router configuration, the security is enhanced considering the fact the new Cisco router would connect several network segments in the organization.

You might be interested in
A mobile device is freezing almost daily. The device remains powered on and the screen illuminated. The user restarts the device
Brums [2.3K]

Answer:

Factory reset the data

Explanation:

This option restores the phone to default thereby eliminating possible files that might have been responsible for the way the phone has been responding for days.

3 0
3 years ago
Drag the words into the correct boxes
tresset_1 [31]

Explanation:

if you have any doubts or queries regarding the answer please feel free to ask

4 0
2 years ago
DO, of X isvvvvvvvvvvvvvvv
dem82 [27]
Huh ? I don’t understand the question
8 0
3 years ago
The structure and organization of data in a database is called a data ____.
Aleks [24]
Answer:  "hierarchy" .
_____________________________________________________
6 0
3 years ago
Which type of transmission do modems use ?
horsena [70]
Asyncronous is the answer I think
6 0
3 years ago
Read 2 more answers
Other questions:
  • How can you recognize an unsecured wireless network?
    9·1 answer
  • When an architect designs a building, what visual design elements could be used to help capture a viewer’s attention? A) The use
    5·2 answers
  • Consider the provided C++ code in the main.cpp file: The function func2 has three parameters of type int, int, and double, say a
    8·1 answer
  • The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling int
    9·1 answer
  • As photography developed, a variety of materials were employed as image capture surfaces. Choose the correct order
    7·1 answer
  • A USB device used to transfer photos from the memory card to a hard drive is called a _____.
    12·1 answer
  • Write the line that declares a two-dimensional array of strings named chessboard. that is, how would i declare a two-dimension a
    7·1 answer
  • Who plays Rblx?? What do yall play?
    9·2 answers
  • Write down eight points on how modern technology have effected our life ?
    12·1 answer
  • Which of the following offers a combination of the features of ram and rom?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!