Which of the following ports is commonly used for the HTTP protocol?

A. 20
B. 25
C. 53
D. 80


Answer: D. 80

Computer Science & Information Technology

You might also like to view...

Which, if any, ICMP Echo Reply message returns to PC1?

What will be an ideal response?

Computer Science & Information Technology

________________ WEP solves the weak IV problem by rotating the keys frequently and uses different keys for different types of traffic.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____ are designed to help give the system administrator information about a specific problem and its causes and may suggest how to solve the problem.

A. Analytic logs B. Debug logs C. Admin logs D. External logs

Computer Science & Information Technology

Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure malicious or not? Did the attack target you specifically, or was it general and you were the unfortunate victim?

What will be an ideal response?

Computer Science & Information Technology