A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with the assigned IP 192.168.0.15 from the Internet. Which of the following is the correct firewall rule?

A. Allow ANY to 192.168.0.15 port 21
B. Allow ANY to 192.168.0.15 port 22
C. Allow ANY to 192.168.0.15 port 80
D. Allow ANY to ANY port ANY


Answer: B. Allow ANY to 192.168.0.15 port 22

Computer Science & Information Technology

You might also like to view...

The color scheme that uses two hues close to one another on the color wheel in which one color is thedominant color and the other is a supporting color used only for highlights and nuance is _____.

A. triad B. tetrad C. analogic D. monochrome

Computer Science & Information Technology

Discuss why NAT is a good security technique.

What will be an ideal response?

Computer Science & Information Technology

There is a significant conflict between the drive for profit and the security requirements that Olivia's organization has standardized. Olivia's role means that decreased usability and loss of profit due to her staff's inability to use the system is her major concern. What is the most likely role that Olivia plays in her organization?

A. Business manager B. Information security analyst C. Data processor D. Mission owner

Computer Science & Information Technology

A wireframe is a planning tool that shows the structure of a website.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology