1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
3 years ago
8

What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b

e a security risk, even if you were using UTP/STP cabling that was insulated to prevent electromagnetic radiation leaks that could be eavesdropped on? What steps might you take to improve security for cabled networks?
Computers and Technology
1 answer:
Paraphin [41]3 years ago
3 0

Answer:

Answered below

Explanation:

Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.

Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.

Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.

You might be interested in
With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organiza
EastWind [94]

Answer:

Infrastructure as a service

Explanation:

With infrastructure as a service, the cloud provider manages the hardware including servers, storage, and networking components. The organization is responsible for all the software, including operating system (and virtualization software), database software, and its applications and data.

7 0
3 years ago
3k means about 3 thousand bytes. how would you express two hundred million bytes? .
barxatty [35]
200,000,000 bytes

200,000KB

200MB

0.2GB

etc, etc.
7 0
4 years ago
The InfoBar is located below the ribbon and on top of a message. It is used for which purposes? Check all that apply. showing th
igor_vitrenko [27]

Answer:

showing the date and time of your response

displaying attachments

providing notice of a meeting request and response

indicating level of importance for the message

showing whether the message has been flagged

Explanation:

edg2021 said so

6 0
3 years ago
Read 2 more answers
Which sentences in the passage show the preventive measures to avoid data breach?
maria [59]
Turn off the whole computer or uninstall the thing that's causing malware (if that the data breach happened when you installed something).
6 0
3 years ago
The processor of a computer communicates to the other parts of the computer through a code that consists of what?
aleksklad [387]

1's and 0's


1's are On and 0's are off

6 0
4 years ago
Other questions:
  • Consider a set of mobile computing clients in a certain town who each
    13·1 answer
  • Where can I easily find an easy app or program to use for making/editing videos?
    13·1 answer
  • _______ is the component of the information system that is described as the equipment that processes data to create information.
    6·1 answer
  • Which of the following are common navigation elements? (Choose all that apply.)
    5·1 answer
  • Assume:
    14·1 answer
  • The file format that an application can always open a named collection of data on a storage medium such as a hard disk or usb fl
    13·1 answer
  • (20points)
    6·1 answer
  • What is the Internet?
    5·2 answers
  • Write ONE SQL statement for each of the following tasks. Note that you can only use conditions specified in the task description
    5·1 answer
  • In the 1760s and early 1770s, the British government wanted to raise money by taxing the residents of its colonies in North Amer
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!