Pete, a security administrator, wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Pete allow on the firewall by default?
A. 21
B. 22
C. 23
D. 25
Answer: B. 22
You might also like to view...
To get a good view of an entire worksheet before you change margins, you might want to reduce the zoom level to less than _____.
A. 80% B. 100% C. 75% D. 50%
A(n) ________ relationship requires a table called a junction table
Fill in the blank(s) with correct word
In a ____, we write out a set of explicit mathematical equations that describes the behavior of a system as a continuous function of time t.
A. composite model B. unit model C. decomposed model D. continuous model
What type of authentication method uses a digital document containing information that establishes an entity's identity?
A. certificate-based authentication B. password-based authentication C. document authentication D. digital verification