Which of the following should be modified because it is weak by default?

A. Default account
B. NAT firewall
C. Wireless encryption
D. PNAC


A. The default account should be modified; often it has a weak password or no password at all. NAT firewalls need to be enabled to work as does wireless encryption and PNAC.

Computer Science & Information Technology

You might also like to view...

The term "selective" refers to the type of behavior produced by an if statement.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Create a file test1 in your present working directory and set its access privileges to read and write for yourself, read for the users in your group, and none to everyone else. What command line did you use to set privileges? Give another command line that would accomplish the same.

What will be an ideal response?

Computer Science & Information Technology

________ enables you to recover important files that may have been corrupted

Fill in the blank(s) with correct word

Computer Science & Information Technology

A tangible benefit can be measured and expressed in financial terms.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology