Answer:
the designer choose because it has many basic and advance feature and it is Synchronous digital hierarchy (SDH) and synchronous optical network (SONET)
refer to a group of fiber-optic transmission rates that can transport digital signals
with different capacities. And it feature is Almost all new fiber-transmission systems now being installed in public networks
use SDH or SONET. They are expected to dominate transmission for decades to
come, just as their predecessor PDH has dominated transmission for more than
20 years (and still does in terms of total systems installed). Bit rates in long-haul
systems are expected to rise to 40 Gbps soon after the year 2000, at the same
time as systems of 155 Mbps and below penetrate more deeply into access
networks.
2 they choose Because of these problems, the big cable networks use hybrid fiber-coax networks. The use of fiber increases the upstream bandwidth and reduces noise, making it easier for upstream data to reach its destination. But upgrading to hybrid fiber-coax is hugely expensive.
Complete Question:
A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.
Group of answer choices
A. scanning
B. subrogation
C. delegation
D. targeting
Answer:
A. Scanning.
Explanation:
A step commonly used for Internet vulnerability assessment includes scanning, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.
Internet vulnerability assessment can be defined as the process of defining, analyzing, measuring, identifying, classification and prioritization of vulnerabilities in network resources used to access the internet. The main purpose of an internet vulnerability assessment is to provide necessary informations or data about the threats being posed to an individual or organization through the use of a scanning program or system such as a network security scanner
Can you give me further explanation? For example, how is your phone not letting you download things? What model of a phone is it? what update is it on? and to what extent can you download something?
Answer:
The technician has made a cross-over cable.
Explanation:
The network is a platform that provides two or more computers to communicate. There different types of networks, namely, local-area network (LAN), wide-area network (WAN), MAN or metropolitan-area network etc.
Devices in a network can be connected with cables (ethernet IEEE 802.3) or wirelessly (wifi IEEE 802.11a/n/g). Wiring standards are strictly followed in ethernet configuration.
Two ethernet wiring standards are T568A and T568B. The difference in both standards are the pin configuration and their position in a wire defines a cable system.
When a T568A or T568B are used on both ends of a twisted pair cable, it is called a straight-through cable. When T568A is used on one end and T568B on the other, it is called a cross-over cable.
These cable systems are used for different applications. the straight-through cable is used for connecting devices that are not the same like router to switch, switch to computer etc. The cross-over cable connects similar network devices like router to router, switch to switch etc.