Which service is enabled on a cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?

Answers

Answer 1
CDP is the service that is enabled in a cisco router or all supported interfaces by default to send and receive CDP information. However, some interfaces, such as ATM interfaces, do not support CDP. It can also be diable on an interface that supports CDP.

Related Questions

Match the appropriate technology to the task. 1. Create a technical drawing of a building. diagramming software 2. Enhance a photograph. CAD 3. Create a process flow. automated fingerprint verification 4. Display a slide-show presentation. projector 5. Verify a person's identity. image-editing software 6. Read and send information by way of a radio signal. radio transceiver

Answers

1) CAD
2) image editing software
3) Diagramming software
4) projector
5) automated fingerprint verification
6) radio transceiver

Answer:

1. Create a technical drawing of a building: CAD

2. Enhance a photograph: Image editing software

3. Create a process flow: Diagramming software

4. Display a slide-show presentation: Projector

5. Verify a person's identity: Automated fingerprint verification

6. Read and send information by way of a radio signal: Radio transceiver

Under extreme programming, ________ and ________ are intimately related parts of the same process

Answers

The answer to this question is: coding and testing
Extreme programming is a software development methodology that aim to improve software quality by measuring whether the technology can be used to fulfill customer's requirement.
To actually get somethings that is accepted by the customers, various coding and testing the software will be done constantly
Coding and testing is the answer.

Which term describes the time it takes to process an order from the time the order is received from the customer until the order is delivered?

Answers

Delivery time, however, on most occasions there will be a dispatch and shipping time, which together make up the delivery time. Dispatch time is the time it takes for an item to be sent after an order has been placed. The shipping time is the time it takes from the moment the item is sent until it arrives at its intended destination.

Final answer:

The term for the duration from receiving a customer's order to delivering it is called lead time. It is a critical factor in business, especially in areas like Organizational Behavior and Supply Chain Management, influencing customer satisfaction and operational efficiency.

Explanation:

The term that describes the time it takes to process an order from the time the order is received from the customer until the order is delivered is known as lead time. In the context of Richard's Furniture Company, we can use a model to predict customer arrival times and the order processing duration. This company delivers continuously between 10 a.m. and 2 p.m., and we are looking at how long past the start time individuals wait for their delivery on average. If one customer arrives every two minutes, it will take on average six minutes for three customers to arrive. The probability calculations based on customer arrival times can also be derived from this information, addressing questions about the likelihood of customers arriving within a certain timeframe after the previous customer.

This understanding is critical in the Business field, particularly within the areas like Organizational Behavior and Supply Chain Management, as it directly influences customer satisfaction, inventory levels, and operational efficiency. Companies must consider every stage of the product or packaging life cycle, from raw material acquisition to end-of-life, to optimize the lead time. Practical business scenarios, such as negotiating with suppliers and shipping arrangements as seen in the example where a firm's favorable shipping contracts allowed for significant savings, illustrate how lead time can be a crucial component in strategic decision-making.

Select each procedure that could harm the computer and cause it to work improperly. Download software from the Internet without permission. Wash your hands thoroughly before using the computer. Turn the power off on the computer before shutting down. Gently type on the keyboard. Set your water bottle near electronics.

Answers

Hello! I would believe that the answer should be: Either Turn the power off on the computer before shutting down. Or Download software from the internet without permission. Please clarify what your lesson is about so I can give you a true answer.

Answer:

Download software from the Internet without permission.

Set your water bottle near electronics.

Explanation:

Juliet is trying to increase her savings account and she decides that she is going save an additional $700 every month. If her monthly take home pay is $5,430, what proportion of her monthly take home pay is she saving?

Answers

Her monthly proportion that she is saving of her monthly take home pay is 12%

Compare volatile and nonvolatile devices. Which one would be better for long-term data storage?

Volatile, because it can only be accessed by those with a password

Volatile, because the data is lost once the computer is turned off

Nonvolatile, because the data is not lost once the computer is turned off

Nonvolatile, because it is less likely to become corrupted

Answers

The answe is
Nonvolatile, because the data is not lost once the computer is turned off 

Nonvolatile memory = your hard drive
Volatile memory = RAM inside the computer. This memory is wiped when the computer shuts down and starts back up.

Answer:

Nonvolatile because the data is not lost once the computer is turned off

Explanation:

For long term storage purpose it is essential to use the Nonvolatile device because Data stored in it is not lost once the system is turned off. while Volatile devices tend to loss data stored in them once the system is turned off.

Volatile devices are better used when high speed data access is required while nonvolatile devices are used for longer -term data storage purposes examples of nonvolatile devices includes: hard disks, re-writable optical disks. and  a common example of volatile device is RAM.

How do you think engel would feel about computers information systems and the internet?

Answers

Final answer:

Friedrich Engel might express mixed feelings about computers, information systems, and the Internet, appreciating their efficiency while worrying about their capacity for class stratification and control. The evolution from a government network to a global economic and social platform may reflect both the potential and perils these technologies represent in accordance with Engel's perspective.

Explanation:

Friedrich Engel, one of the founders of Marxist theory, might hold mixed feelings about computers, information systems, and the Internet. On one hand, he may appreciate how these technologies enhance productivity and communication, aligning with his views on the progression of societal systems. On the other hand, he might harbor concerns about their potential to exacerbate class distinctions and control by powerful entities. It's evident that the Internet's origin as a scientific/government network positioned it as an information-sharing platform that evolved into today's Internet, heavily influencing global commerce, communication, and culture.

Take, for instance, how digital technology is often likened to the steam engine during the industrial revolution. Prominent figures such as Steve Jobs and Bill Gates are compared to industrial magnates due to their significant influence on the societal embrace of digital media. The transition into the information age introduced hope for progress but also anxiety concerning the rapid change and its implications on privacy and control, reminiscent of concerns Engel might express.

Further examining the impact, the Internet indeed has revolutionized personal and professional realms, evidenced by the near-universal reliance on tech across various sectors, and the significant role it plays in shaping relationships, culture, and politics globally.

One purpose of the dual ignition system on an aircraft engine is to provide for?

Answers

It is done to provide for better engine performance. It is important for two main reasons. One is that if one ignition system fails the other can for a time take care of it and hold its ground until you land or fix it. Another is that it is used for more efficient consumption of fuel and air which makes the engine work better.
Answer: Redundancy

Explanation:
An aircraft is a system that cannot tolerate faults or errors because the consequences can  be fatal.
Therefore the ignition system is an excellent design candidate for redundancy.
Redundancy ensures that if the primary ignition system fails, a reliable backup ignition system will be available.

Another example of redundancy is the use of electric power generators in a hospital. They back up the primary electricity power supply because failure of electric power during surgery cannot be tolerated.

The most common wireless technology for tv and dvd remote control devices is _______.

Answers

I think it "IR" aka "infrared". IR is used in about 99% of tv and DVD player remotes. IR is an invisible light that shoots out of your remote. It can't be seen by the naked eye, but some cellphone cameras can pick it up ( fun fact )

The _____ is a storage location for text awaiting pasting.

Answers

What's your answers? 

Answer:

Explanation:

Clipboard

Converting from type ________ to type ________ will result in the loss of data.
a. bool, char.
b. float, double.
c. int, char.
d. short, long

Answers

Converting from a type with greater capacity (double) to one with lesser capacity (float) poses a risk of data loss due to differences in precision and range. The conversion from float to double itself does not result in data loss.

When converting from one data type to another, particularly in programming languages that are strictly typed, it is important to consider whether the conversion will result in a loss of data.

The loss of data can occur when converting from a type with a greater capacity to store information to a type with a lesser capacity. In the options provided:

bool to charfloat to doubleint to charshort to long

The conversion that will most likely result in a loss of data is from float to double. This is because a 'float', or floating-point variable, typically has less precision and a smaller range compared to a 'double', or double-precision floating-point variable.

Therefore, when converting from a float to a double, the precision of the value may not change, and thus no data is lost; however, the reverse conversion from a double to a float can result in loss of precision and potentially also in the loss of range.

The command to display the word unix in quotation marks is:

Answers

echo '"unix"'




----------------------------

Ou have just set up a network that will use the tcp/ip protocol, and you want client computers to obtain ip configuration automatically. which type of server do you need for this?

Answers

DHCP (Dynamic Host Configuration Protocol)

To join two or more objects to make a larger whole is to _____________ them.
a.

regulate
b.

compliment
c.

integrate
d.

correlate

Answers

C. Integrate

Integrate means to make a object larger by joining another to it

hope this helps

Answer:

It is integrate

Explanation:

Got it right on Edge :)

In linear programming a solution that does not simultaneously satisfy all constraints is called an

Answers

When it comes to linear programming, the solution which would be effective in satisfying all constraints in the given program in a simultaneous matter is called that of feasible programming. This is due to the fact that the program can satisfy all requirements at the same time.

Which is not a tool hackers use to gain access to and take control of your computer?

Answers

A rat/ or kalilinux is used to take over your computer but Kalilinux is a linux program most hackers use it to do all types of stuff with it if not to use kali the other software is a rat witch can take control of your whole computer and a rat is a virus witch is hard to get away from 

6 The part of the computer that contains the brain or central processing unit is also known as the ?

Answers

Answer:  "CPU" .
________________________________

Why is it important to back up data on a computer before you burn-in test the cpu?

Answers

A burn-in test is a test which is usually performed on a system or component by running it for a long time in order to bring out any errors or system failures etc. 
While doing it on CPU the data must be backed up as any kind of error or failure may result in the loss of data, at time systems can be repaired to retrieve data but still there is no guarantee, backing up is the best option.

An email ____ consists of the computers and software that provide email services.​

Answers

I think it could be email server?

90-95% of the population of the Ohio River Valley has been exposed to Histoplasma capsulatum, but relatively few individuals are diagnosed with histoplasmosis. Why is this so?

Answers

Histoplasmosis is an infection caused by the fungal species known as Histoplasma. It thrives in soil that contains high levels of bird or bad droppings. Even though over 90 percent of the Ohio Valley has tested positive for exposure only persons with weaker immune systems and certain jobs or situations seem to get infected. High risk jobs include agriculture, roofing, construction or being in an environment with bird droppings. 
A healthy immune system clears the infection before signs and symptoms can appear in these individuals.

What is the three letter acronym for a network that serves just your office?

Answers

A Local Area Network, or LAN.

Your teacher has asked you to do a report on water conservation, you find a website that explains it perfectly. You copy the paragraph off the website, but you change a few words and type it on your own document. Is that plagiarism? Yes or No?

Answers

Yes, because you are using someone else's ideas and have not given them credit. 
Personally, I would say that it is not. But to be honest, it really is. So the answer is yes.

What is the range of the well-known ports used by tcp and udp?

Answers

/etc/services on my CentOS machine goes up to 49000. Reserved ports are less than 1024.

Well known and reserved ports are two different things. Well known ports only need a registration with IANA. Reserved ports, on *nixes, requires root for a deamon to bind to the port.

What command would you issue from the command prompt to test whether your computer has connectivity to the network?

Answers

ping ${myDefaultRoutersAddress}

Personally, I'd probably run ifconfig to see my network setups. Then I'd need to run "netstat -rn" to get my default router's address.

When might an lcd monitor experience distorted geometry?

Answers

The time when an LCD monitor is experiencing distorted geometry is when there is a presence of the screen into having a display that is not set on the resolution that is supposed to be in native, this is indicative that it is experiencing distorted geometry.

When investigating a mobile device, after determining the device is safe to handle, network connectivity should be disabled to avoid:?

Answers

The network connectivity should be disabled when investigating a mobile device so that there will be prevention of connection with the device and that the evidence will be maintained in a original condition without having any interferences with other networks if it has been turned on.

Hard drives have the largest capacity of any storage device.
a. True
b. False

Answers

it's false as they store way lesser than we think
The answer is true. It does have the largest capacity of any storage device


Which network tier forms the internet backbone?

Answers

Tier 1 Tier 1 providers have the largest and fastest network connections available. A reasonable definition of a tier 1 provider is a network that can reach every other network on the Internet without purchasing IP transit or paying for peering. You might consider a Tier 1 network to be an ISP for other ISPs. Because of their extremely good connectivity, other network providers pay Tier 1 networks to carry their data for them to other locations. As of this time, there are less than 20 Tier 1 network providers worldwide.

Option (A) Tier 1 networks form the Internet backbone. These networks do not pay for Internet transit and exchange traffic with other Tier 1 networks.

Tier 1 networks are the backbone of the Internet. These networks do not pay for Internet transit because they exchange traffic with other Tier 1 networks. They have the infrastructure and agreements necessary to carry traffic across long distances and between countries, essentially forming the core of the entire Internet.

Examples:

AT&TCenturyLinkNTT Communications

These companies are some of the major Tier 1 network providers that connect various ISPs and large corporations to create the Internet backbone.

Correct Question

Which network tier forms the Internet backbone?

a. Tier 1

b.Tier 2

c. Tier 3

d. Tier 4

True or false while the internet and social media are vital for spreading campaign messages, television advertisements are considered ineffective

Answers

Salutations!

The answer is false. Social media, internet, television, are all effective to spread campaigns, news etc. This is the easiest and the fastest way to get information. All these sources are very strong and can reach information any where in the world within minutes.

Hope I helped (:

have a great day!

In a newspaper advertisement for a hybrid car, which of these presentation methods would be most effective
A. Chart showing the rising price of gas
B. A list of the most expensive gas station in the city
C. Technical diagram of the hybrid engine and why it works
D. A quote from a famous actress on why she bought a hybrid

Answers

Your answer is a....
A; chart showing rising price of gas.

One benefit of hybrid cars is that you have to spend less on gas. Showing people that they will indeed be saving more and more money as gas prices rise is a great motivator to get a hybrid car.
Other Questions
In the early 1900s, what is now known as "social casework" expanded from children's aid and charity organization societies to: Francesco Redi disproved the idea of spontaneous generation through an experiment involving _____.mud and frogswater and plantsmeat and flies In a series circuit, when you add more resistance, what will happen to the amount of current? What did Philadelphia and new Amsterdam have in common Simplify. 54+4(3412)2 The probability of the complement of an event is ____ less than the probability of the event itself.A. Not enough information provided to answer the question.B. SometimesC. AlwaysD. Never how long would it take a ball dropped from a 100 ft building to hit the ground Explain how you can use multiplication to find the quotient 3/43/16. Then evaluate the expression we have to find 2 syllable word in following sentence " We will rake the leaves and then we will trim the bushes" What is 763 thousandths in scientific notation? What does hadero mean when she uses the term, "sonic lineages". what does she describe as her own sonic lineages? You reach into a bag of coins and withdrew two coins without replacement. What is the probability you withdrew a nickel and then a dime if the bag held ten pennies, six nickels, and five dimes?1.30/442.5/143.1/14 Which of the following is equivalent to the expression (9x^2y^3)(12x^-3y^5)( 2xy)? 23x^-5y^8 216^9 -x^-6y^8 What effect does Dr. King allusion to the Declaration of Independence have on the speech? "This note was a promise that all men--yes black men as well as white men--would be guaranteed the unalienable rights of life, liberty, and the pursuit of happiness" A- The allusion shows the listener that Dr. King understands the Declaration of Independence.B- The allusion reminds the listener of the rights and beliefs that are the foundation of America.C- The allusion reminds the listener that slavery is illegal.D- The allusion explains why Dr. King is making this speech. i need help please on this one What was the name of the series of bloody wars that took place in the New England colonies between the Puritans and American Indians once the English population increase?A) King Philips War and the Pequot wars B) The New England WarsC) The Puritan Indian Wars D) Powhatan's Wars Your observations should have revealed at least one difference in the properties of the sodium benzoate and the benzoic acid. what property was it and what observation revealed the difference? To find 79 times 24 multiply 80 by 24 and take off a group of 24 vinnie had a lot of credit cards, and he did have fun with them! then he nearly went broke. what was the main thing vinnie did wrong? how does a nonprofit food service operation differ a for-profit operation? Steam Workshop Downloader