1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
2 years ago
7

on which two interfaces or ports can security be improved by configuring executive timeouts? (choose two.)

Computers and Technology
1 answer:
ELEN [110]2 years ago
5 0

Executive timeouts are configured using ports such as Console port, Aux port, VTY port.

Executive time outs are used to automatically disconnect devices which have been idle for a specific period of time.

In IOS devices, the executive timeout automatically disconnect users after 10 minutes of inactivity. These users can either be console or VTY user. The executive timeout can be set using line mode command.

Executive timeouts are configured using ports such as Console port, Aux port, VTY port.

Find out more using: brainly.com/question/13025617

You might be interested in
What is Roko's Basilisk?
serious [3.7K]

Answer:

Roko’s basilisk is a thought experiment proposed in 2010 by the user Roko on the Less Wrong community blog. Roko used ideas in decision theory to argue that a sufficiently powerful AI agent would have an incentive to torture anyone who imagined the agent but didn't work to bring the agent into existence.

7 0
3 years ago
If i don't update my computer what threat does my computer face?
Nadusha1986 [10]
Hey there! Hello!

Computer updates, especially smaller security updates, contain security information for new bugs, malware, viruses, etc. that have been written since your last update. So many of these are written for computers at any given time, meaning that keeping your computer updated is a significant step in keeping your computer's defense systems working. Paired up with legit anti-malware, virus protection software, good computer knowledge, and common sense, your computer can remain very safe from these viruses. 

Otherwise, there might be some bug or irregularity within your computer's system itself that was accidentally released an update or two ago by the creators of your computer's software, which may also pose a threat for your computer system. Updating your computer can most likely fix problems like these. But, more commonly, they just keep your computer up to date on the vicious computer threats that are now available for it since the previous update. 

Hope this helped you out! Feel free to ask me any additional questions if you have any. :-)

8 0
3 years ago
Which of the following formats can algorithms NOT be written in:
Zina [86]
The answer is Flow chart
6 0
3 years ago
What has impacted the world more: The initial creation of telephone or a smart cellphone? Explain your reasoning!
-BARSIC- [3]
If this is on personal opinion, I would say the initial creation of the telephone. Even though a smartphone practically kickstarted a whole era to technology that is still going on till this day, it was the telephone that started this all. If it wasn’t for the idea to create a phone that is more advanced than a box attached to the wall, none of these advancements would’ve happened at all. (Although that is uncertain, things do tend to have a way of working out in the end. If someone didn’t invent it, another person would’ve thought of it sooner or later.) But that is only if we’re talking long term, which I prefer because there was no limit to when the results of impact started in the prompt stated above, yet if we were to speak short term and the faster one, the credit would go to the smart cellphone. But we aren’t, because the question never specified ;)
5 0
3 years ago
Which tag denotes the end of an element in HTML? A. / B. * C. > D. ) E. _
Lilit [14]

C. ">" denotes the end of an element. For instance <b>Hello!</b> or <hr />

6 0
3 years ago
Other questions:
  • Will upvote all answers
    7·1 answer
  • You have deployed your Ethernet cable near a generator, whose heat is effecting the cable in a way that its energy is lost. If s
    11·1 answer
  • Which risk management framework does the organization of standardization publish
    13·1 answer
  • The World Wide Web is full of unstructured data. Search engines like Google, Bing and Yahoo have been doing a good job of allowi
    5·1 answer
  • Renae wants to write a blog about her favorite sports stars. She wants the blog to be informative and visually appealing, so she
    13·2 answers
  • What is the difference between a workbook and a worksheet?
    14·2 answers
  • Which of the following correctly declares and initializes a Scanner object that will use input from the keyboard as its data sou
    13·2 answers
  • Specifications that establish the compatibility of products and the ability to communicate in a network are called:
    10·1 answer
  • Which symbol is used for an assignment statement in a flowchart?
    13·1 answer
  • One last question
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!