Answer:
who are interested and I have been trying to
Complete Question:
The main disadvantage of using this device is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.
Group of answer choices
a. Router
b. Switch
c. Bridge
d. Hub
Answer:
d. Hub.
Explanation:
A hub can be defined as a layer one (physical) device used for connecting various network devices such as switches and routers in a local area network (LAN). It comprises of many ports which are used for connecting segments of a local area network (LAN). Hubs are generally considered to be unintelligent because when frames are received at a port, it is then copied to every other connected port on the network.
<em>Hence, the main disadvantage of using a hub is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.</em>
Answer: Stealth scanning technique
Explanation:
Stealth Scanning technique includes the following steps:
1. The client upon sending a single SYN packet to is responded by SYN/ACK packet if the port is open.
2. The port is assumed to be in closed state if the RST packe t is sent from the server.
3. This RST packet is sent by the client to close the initiation process so that a connection cannot be established.
The cloud technology characteristic that ensures that a cloud customer can make changes to her cloud database from her smartphone is Broad network access.
<h3>What is the network about?</h3>
Broad network access is known to be a feature of cloud computing as it is seen as the ability of network tools to be able to link with a large scope or variety of devices.
Note that The cloud technology characteristic that ensures that a cloud customer can make changes to her cloud database from her smartphone is Broad network access.
Learn more about cloud technology from
brainly.com/question/19057393
#SPJ1
Answer:
Set up audit trail
Explanation:
The administrator should set up an audit trail in order to get this information.
An audit trail would give him the record of all the configuration changes that have been made in a file or a database in the last 6 months.
Audit trails can be manual or electronic. It provides history and also documentation support. It can authenticate security and also help to mitigate challenges.