1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
3 years ago
8

What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b

e a security risk, even if you were using UTP/STP cabling that was insulated to prevent electromagnetic radiation leaks that could be eavesdropped on? What steps might you take to improve security for cabled networks?
Computers and Technology
1 answer:
Paraphin [41]3 years ago
3 0

Answer:

Answered below

Explanation:

Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.

Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.

Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.

You might be interested in
Declaring a member as ____ in the base class provides access to that member in the derived classes but not to anyone else. a. pu
Sidana [21]

When a member is declared as b. <u>protected</u> in the base class, it provides access to that member in the derived classes but not to anyone else.

<h3>What is a derived class?</h3>

A derived class can be defined as a type of class that inherits the information or members of a base (parent) class such as a car in a syntax.

Basically, a public class is accessible to everybody while a private class can only be accessed by users within the declared class. Also, a constant is a class whose value remains unchanged.

In Computer programming, when a member is declared as <u>protected</u> in the base class, it ultimately provides access to that member only in the derived classes but not to other members or anyone else.

Read more on data types here: brainly.com/question/20264183

#SPJ1

6 0
2 years ago
which server edition doesn't support any server roles that you would typically use with standard version
ioda

On the standard version of Microsoft Windows, Dynamic Host Configuration Protocol Server and Hyper-V Remote Access are two roles that aren't supported on Azure Virtual Machines - a type of server.

<h3>What is a Server?</h3>

It is to be noted that this is a computer device (hardware) or virtual environment (software) that feeds another computer with special services.

<h3>Type of Server</h3>

The following are various types of servers:

  • Webserver
  • Proxy Server
  • Virtual Machine (VM)
  • Database Server
  • Mail Server

See the link below for more about Servers:

brainly.com/question/25435769

8 0
3 years ago
How to fix the acount when it says "Uh oh, this account has been restricted because of an unusual amount of activity.
likoan [24]

Answer:

Make sure that the email is verified. Also, usually sites do this when there are multiple log ins on multiple devices. It makes the site think that you are in multiple places at once making it seem suspicious. What i would do is clear cache and change the email and password associated with the account. If all fails contact brainly support

7 0
3 years ago
What is a clutch on a car
grandymaker [24]
<span>The first stage in the transmission of a car with a manual gearbox is the clutch.</span>
6 0
4 years ago
Tracking a basketball's backspin with an internal sensor can...
valkas [14]
Help a player improve one part of this shooting technique
5 0
3 years ago
Other questions:
  • 1. Please write the following code in Python 3.2. Please also show all outputs.Create a dictionary named letter_counts that cont
    14·1 answer
  • The growing network of physical objects that will have sensors connected to the Internet is referred to as the ________.
    13·1 answer
  • When we convert an automaton to a regular expression, we need to build expression not go through certain other states. Below is
    15·1 answer
  • You use ddl to create, modify, and delete the ___________________________ of a database.
    6·1 answer
  • Consider the following concurrent tasks, in which each assignment statement executes atomically. Within a task, the statements o
    9·1 answer
  • Select the correct answer.
    9·1 answer
  • 9.6 Code Practice, this is in Python, I need its quick!
    13·1 answer
  • The part of the screen where you see the results of your code is called the Editor.
    15·2 answers
  • Which is a connectionless protocol in the transport layer? What are the small chunks of data called?
    12·2 answers
  • I NEED HELP W/ BINARY NUMBERS ‼️⚠️‼️⚠️‼️⚠️‼️ DUE IN 15 MINUTES
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!