Which of the following ports should you disable so that they no longer respond to network requests on a Linux system due to a lack of encryption? (Choose all that apply.)
A. 21
B. 22
C. 23
D. 80
Answer: A and C
A. 21
C. 23
You might also like to view...
If we have a full selection of accessor and mutator functions, why would we have friend functions?
a. You should not have them b. More efficient access to the private data members. c. The friend function must call the accessor or mutator functions anyway. d. none of the above
Which of the following statements is false?
a) You can use any custom color created from a combination of alpha (transparency), red, green and blue components called ARGB values—each is an integer in the range 0–255 that defines the amount of alpha, red, green and blue in the color, respectively. b) An alpha value of 0 is completely opaque and an alpha value of 255 is completely transparent. c) In the IDE, the alpha is specified as a percentage from 0 to 100, which the IDE then translates into 00–FF. d) To specify an ImageBrush for a TextBlock, click the tab below the Foreground property, then specify values for the Stretch and ImageSource properties.
What is the command that you issue if you want to delete all files and directories under the directory /mydirectory?
What will be an ideal response?
What is the primary protocol that is used to mitigate Layer 2 loops?
A) CDP B) LACP C) STP D) Ethernet