1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
3 years ago
8

What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b

e a security risk, even if you were using UTP/STP cabling that was insulated to prevent electromagnetic radiation leaks that could be eavesdropped on? What steps might you take to improve security for cabled networks?
Computers and Technology
1 answer:
Paraphin [41]3 years ago
3 0

Answer:

Answered below

Explanation:

Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.

Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.

Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.

You might be interested in
What bit position in an ascii code must be complemented to change the ascii letter represented from uppercase to lowercase and v
MariettaO [177]
Flip bit position 5 to accomplish this. This maps to hex value 0x20, where the least significant bit is assumed to be at position 0.

Example: ascii "A" = 0x41, "a" = 0x61.  0x41 xor 0x61 = 0x20.

You would implement a flip function by XOR'ing the character value with 0x20.
4 0
3 years ago
Is a NAS just a collection of hard drives or a computer
skelet666 [1.2K]

Answer:

NAS systems are networked appliances that contain one or more storage drives, often arranged into logical, redundant storage containers or RAID.

8 0
3 years ago
Given the lists list1 and list2, not necessarily of the same length, create a new list consisting of alternating elements of lis
tester [92]

Answer:

The following code is written in Python Programming Language.

Program:

list1=[1,2,3]

 # initialized the list type variable

list2=[4,5,6,7,8]

  # initialized the list type variable

list3=[]

   # initialized the empty list type variable

for j in range(max(len(list1), len(list2))):   #set for loop

 if j<len(list1):

  #set if statement

   list3.append(list1[j])

  #value of list1 appends in list3  

 if j<len(list2):

   #set if statement

   list3.append(list2[j])

  #value of list2 append in list3

print(list3)    #print the list of list3

Output:

[1, 4, 2, 5, 3, 6, 7, 8]

Explanation:

Here, we define three list type variables "list1", "list2", "list3" and we assign value in only first two variables "list1" to [1, 2, 3] and "list2" to [4, 5, 6, 7, 8] and third list is empty.

Then, we set the for loop and pass the condition inside it we pass two if conditions, in first one we compare the list1 from variable "j" inside it the value in list1 will append in list3, and in second one we compare "j" with list two and follow the same process.

After all, we print the list of the variable "list3".

5 0
3 years ago
Please explain what Level 5 Automation is and give 2 examples of the technology.
arsen [322]

Level 5 ( Full Driving Automation ) Level 5 cars won't even have steering wheels or acceleration / braking pedals . They will be free from geofencing , able to go anywhere and do anything that an experienced human driver can do .

Pls follow me and Mark as brainlest!!! :-)

8 0
3 years ago
In a folder hierarchy, the top level is referred to as which of the following?
Vesnalui [34]

Answer:

B. root

Explanation:

Every user in Linux is assigned a folder from which they can store their files. The interpreter allows you to abbreviate your route with the “~” symbol. The ls command without any additional data shows the files in the current directory, but if after the name of the command a path is written, it shows the files in that path. Therefore, the ls ~ command shows the files in the user's folder.

In addition to the folders and files created by the user or programs, every Linux folder has two subfolders defined by default:

“..”: It is the top level folder in the file hierarchy that contains it. This subfolder is also present in the root of the filesystem (the folder with absolute path “/”), but points to itself.

“.”: It is the folder itself that appears as if it were also a subfolder. It can be considered as a "self-reference" or pointer to itself.

These folders are normal folders in the system for all purposes; that is, they can be used on routes. For example, the path /dirA/dirB/dirC/../fichero2.txt refers to the file that is stored in the dirB folder, since from dirC, the folder .. points to its predecessor, dirB. The following figure shows the interpretation of this route as well as the equivalent of the “..” and “.” Folders.

4 0
3 years ago
Other questions:
  • What is 1/10 of 2.0 in decimal form​
    10·1 answer
  • Which sign or symbol will you use to lock cells for absolute cell reference
    5·1 answer
  • QUESTION: Which is not an example of a video port or cable?
    10·1 answer
  • Name the functional arms of MSDE.
    13·1 answer
  • When a climbing distance of __________, landing platforms must be in place every __________ feet. Platforms will be offset from
    12·1 answer
  • A cycle merchant allows 15% discount on the marked price of a bicycle and still he makes a profit
    14·1 answer
  • Why do computers use binary code?
    12·2 answers
  • Which of the following is a characteristic of a college savings plan
    6·2 answers
  • Wha are the types of slide show? define​
    10·1 answer
  • Sharing resources.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!