Which of the following are secure protocols, ports, services, or applications? (Select TWO.)

A. SLP
B. Port 443
C. SMTP
D. SSH
E. Ports 161/162


Answer: B. & D.

Computer Science & Information Technology

You might also like to view...

When dragging and dropping a clip segment from one part of a sequence to another, which is the default type of edit—overwrite or insert?

What will be an ideal response?

Computer Science & Information Technology

A user finds that the later in the day it gets, the slower the tablet is. If the device is restarted, it performs better, but again, the longer the device has been powered up, the slower it performs. What should the technician check first?

A) Memory utilization B) Battery power C) Running apps D) Cloud synchronization

Computer Science & Information Technology

Case-Based Critical Thinking Questions ? Case 4-2 Mya has just surveyed 100 students to get their reaction to a new textbook she is reviewing. She has one data series that she wants to represent graphically, and she needs to display her data in a way that lets her visually compate the data values and see how much contributes to the whole. ? ? Mya has decided she needs to move her chart so that it appears below her data source.  Before she can move or resize her chart she must ______.

A. select the chart B. hold down the SHIFT key C. adjust the sizing handles D. move the mouse pointer to the center of the chart.

Computer Science & Information Technology

Because the@-webkit-keyframesrule and the:validpseudo-class are not part of the CSS specification, they cause __________ errors.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology