Encrypted control of remote computers using the RDP protocol is accomplished using what port number?
a. TCP 22
b. UDP 161
c. TCP 3389
d. UDP 10000
ANSWER: c
Computer Science & Information Technology
You might also like to view...
What security issues are liable to be relevant to a directory service such as X500 operating within an organization such as a university?
What will be an ideal response?
Computer Science & Information Technology
The __________ is a layer of software between the applications and the computer hardware that supports applications and utilities.
What will be an ideal response?
Computer Science & Information Technology
If an asterisk appears after the file path outside of the brackets, it means that the page has been modified and saved.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
With a compiled program, all the source code is converted to machine code and stored in a ____ before the user runs the script.
A. temporary file B. buffer C. binary file D. variable
Computer Science & Information Technology