1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
2 years ago
8

What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b

e a security risk, even if you were using UTP/STP cabling that was insulated to prevent electromagnetic radiation leaks that could be eavesdropped on? What steps might you take to improve security for cabled networks?
Computers and Technology
1 answer:
Paraphin [41]2 years ago
3 0

Answer:

Answered below

Explanation:

Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.

Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.

Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.

You might be interested in
someone help me my browser is updated I don't know what to do someone help me please I'm trying to watch Crunchyroll.​
levacccp [35]

Answer: use chrome or firefox the browser app your using is one that they dont support

Explanation:

4 0
2 years ago
Read 2 more answers
Which of the following best describes today’s average gamer?
GrogVix [38]
The correct answer is A
6 0
2 years ago
Complete each statement by choosing the correct answer from the drop-down menu.
mihalych1998 [28]

Answers for edg:

1- speaking and listening

2- nonverbal communication

3. gestures often have multiple interpretations

4. interpreting body language and behavior

Explanation: hope this helped! i just did them and they were right :)

7 0
3 years ago
Read 2 more answers
When was JavaScript founded?<br> Write in this format:<br> mm/yy
liq [111]

Answer:

It was founded in 09/95

Explanation:

7 0
3 years ago
Read 2 more answers
Which document contains the dod cyber regulations for cui and cti??
ivolga24 [154]
<span>The question above has multiple answers you can choose from;

a. DFAS
b. FR-CI
c. DFARS
d. AR 25-2

The answer is (C) DFARS

On October 4, 2016, the Department of Defense issued a rule finalizing cyber reporting regulations. This rule was applicable to Department of Defense contractors and subcontractors. Notably, the final rule clarifies by CDI (covered defense information). This term is used in the DFARS (Defense Federal Acquisition Regulation Supplement). It defines CDI to include 4 categories; covered technical information (CTI); controlled unclassified information (CUI); operations security; export controlled information; and any other information identified or otherwise marked in the contract.</span>
7 0
2 years ago
Other questions:
  • What do you understand by technological depenence?
    9·1 answer
  • Which item is used for formatting in responsive web design?
    12·1 answer
  • 5.14 Describe how the compare and swap() instruction can be used to provide mutual exclusion that satisfies the bounded-waiting
    13·1 answer
  • How to write conclusion of hard disk​
    11·1 answer
  • Which of these is NOT an example of a GUI?
    7·1 answer
  • Please write a Java program to read movies.txt file. (It is in Modules under Chapter Code) Create your own movies.ser file from
    14·1 answer
  • What is a trojan horse
    8·2 answers
  • Small programs are shortcuts that are displayed as graphics pinned to your desktop are called_____
    7·1 answer
  • A type of employment test that is used to determine if personal and behavior preferences match the position.
    12·1 answer
  • Class Main {
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!