1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
3 years ago
8

What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b

e a security risk, even if you were using UTP/STP cabling that was insulated to prevent electromagnetic radiation leaks that could be eavesdropped on? What steps might you take to improve security for cabled networks?
Computers and Technology
1 answer:
Paraphin [41]3 years ago
3 0

Answer:

Answered below

Explanation:

Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.

Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.

Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.

You might be interested in
Different computer applications and their uses.
sukhopar [10]

Answer:

Application Software Type Examples

Word processing software MS Word, WordPad and Notepad

Database software Oracle, MS Access etc

Spreadsheet software Apple Numbers, Microsoft Excel

Multimedia software Real Player, Media Player

Presentation Software Microsoft Power Point, Keynotes

Explanation:

5 0
3 years ago
________ is a command-line utility installed in the windows\system32 folder that displays information about your windows version
Ne4ueva [31]
Im pretty sure its SystemInfo...... 
6 0
3 years ago
AP CSA help needed. Java please.
leva [86]
#include using namespace std;int main(){int year = 12,value = 10,total = 0;do{year++;value *= 2;total += value;}while(value*2 < 1000);cout << "Age: " << year << endl;cout << "Last gift: " << value << endl;cout << "Total: " << total << endl;cin.get();return 0;
5 0
2 years ago
New friends??? if you want to be my new friend go follow my gram
lord [1]

Answer:

what you need

only friends

4 0
3 years ago
Read 2 more answers
With which game is shigeru miyamoto associated
Juliette [100K]

Answer: Mario, Donkey Kong, and Legend of Zelda.

To be honest those are not the only games that Shigeru Miyamoto is associated with, but these are the games that he is most known for. Shigeru Miyamoto is a video game designer and producer who works for the Nintendo company.

These games mentioned are just some of the games that he helped produce for the company. He started working for the Nintendo company on 1977 and helped with the production of multiple games after joining the company. He initially started working in the Nintendo company as a manga artist, but then moved on to help design and produce different video games.

4 0
3 years ago
Other questions:
  • Select all that apply. Hyperlinks can appear as: words pictures symbols trademarks
    12·2 answers
  • Which does an icon on the desktop signify?
    12·1 answer
  • You can tell a cell is the active cell when it has a
    14·2 answers
  • How would you define data science ?
    10·1 answer
  • What is the difference between a workbook and a worksheet?
    14·2 answers
  • Which symbol is at the beginning and end of a multiline comment block? ### &amp;&amp;&amp; %%% """
    14·1 answer
  • The head of small organization wants to install a network so that all the employees of different department can share various re
    14·1 answer
  • True or False <br> Hebrew Bible and the Koran were first written in English.
    15·1 answer
  • An analog video is a video signal transmitted by an analog signal, captured on a (blank)
    13·1 answer
  • Which of the listed tools would a barber likely use in the following scenario?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!