Pete, a security administrator, wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Pete allow on the firewall by default?

A. 21
B. 22
C. 23
D. 25


Answer: B. 22

Computer Science & Information Technology

You might also like to view...

To get a good view of an entire worksheet before you change margins, you might want to reduce the zoom level to less than _____.

A. 80% B. 100% C. 75% D. 50%

Computer Science & Information Technology

A(n) ________ relationship requires a table called a junction table

Fill in the blank(s) with correct word

Computer Science & Information Technology

In a ____, we write out a set of explicit mathematical equations that describes the behavior of a system as a continuous function of time t.

A. composite model B. unit model C. decomposed model D. continuous model

Computer Science & Information Technology

What type of authentication method uses a digital document containing information that establishes an entity's identity?

A. certificate-based authentication B. password-based authentication C. document authentication D. digital verification

Computer Science & Information Technology