What port must be enabled in the Windows firewall on the iSCSITarget machine?

A. 443
B. 5900
C. 3389
D. 3260


Answer: D

Computer Science & Information Technology

You might also like to view...

When emergency changes have to be made to systems, the system software may have to be modified before changes to the requirements have been approved. Suggest a model of a process for making these modifications that will ensure that the requirements document and the system implementation do not become inconsistent.

What will be an ideal response?

Computer Science & Information Technology

Which of the following IPSec protocols manages the exchange of encryption keys?

a. AH b. ESP c. IPComp d. IKE

Computer Science & Information Technology

Many forms use fill-in fields called placeholders.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The term ____ describes products that are commercially available and can be purchased and integrated with little or no customization.

A. TCSEC B. MLS C. OTC D. COTS

Computer Science & Information Technology