What is the firewall port used by the NFS server?
A. 49
B. 249
C. 1049
D. 2049
Answer: D
You might also like to view...
Components of a computer-based information system include people such as the CIO (chief information officer) and end-users.
Answer the following statement true (T) or false (F)
Arrays static method ____________ fills an array with values produced by a generator function.
Fill in the blank(s) with the appropriate word(s).
You can use a(n) ____ to access data records in a logical order that differs from their physical order.
A. linked list B. index C. either a linked list or an index D. neither a linked list nor an index
Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?
a. File Transfer Protocol (FTP) b. FTP Secure (FTPS) c. Secure FTP (SFTP) d. Trivial FTP (TFTP)