answersLogoWhite

0


Best Answer

Password recovery

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What cannot be performed when using a telnet session to a remote router?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

A network administrator needs to keep the user ID password and session contents private when establishing remote CLI connectivity with a router to manage it Which access method should be chosen?

SSH


Why is a PC trying to ping a router fails?

The obvious answer is that the remote router is switched off !


How can you build a wireless receiver using a router?

Theoretically you can, but you need to know the code for router's software. Because you will have to modify it manually. It's very far from a simple task and cannot be performed even by advanced users.


On a router which actions can be performed in user mode?

view current router configuration


Why do routers use anding?

ANDing is used by a router, to see if the host which has to be contacted, is on the local network of the router, or a remote network.


Where will a router operating system image be copied after the copy?

remote server


Which device should be used for routing a packet to a remote network?

router


What is the risk if not logging off each session when internet connection is via a router?

If you are using public or not protected network your session can be hijacked and used to harm your privacy.


Why doesnt your remote computer work with your belkin wireless router?

By default wireless routers block all incoming connections. You need to to open the remote desktop port on the router. And also you might have to setup redirecting of incoming remote desktop connections on a particular pc.


What command will clear a connection to a remote router?

which command will clear a connection to aemote sarver


What is a router on the local network that is used to deliver packets to a remote network?

Default gateway


What router configuration option do you use to Prevent attackers from eavesdropping on your configuration session?

Secure shell (SSH) settings