R
Q. Which of them is not an appropriate method of router security?
Unused ports should be blocked, Unused interfaces and services should be disabled, and Packet filtering needs to be enabled are some of the security measures that need to be taken for the routers.
You must be Logged in to update hint/solution
Q. Which memory is non volatile and may be written only once?
Q. What is a person called who uses a computer to cause harm to people or destroy critical systems ?
Q. Which type of computers uses the 8-bit code called EBCDIC?
Q. Which part is the “brain” of the Computer?
Q. Unmodulated signal coming from a transmitter is know as
Q. When you purchase a product over a Mobile Phone, the transaction is called ___
Q. A program in execution is called
Q. Connectivity for a new computer means
Q. Which among the following is a language directly understood by CPU
Discusssion
Login to discuss.