A firewall technician has been instructed to disable all non-secure ports on a corporate firewall. The technician has blocked traffic on port 21, 69, 80, and 137-139. The technician has allowed traffic on ports 22 and 443. Which of the following correctly lists the protocols blocked and allowed?

A. Blocked: TFTP, HTTP, NetBIOS; Allowed: HTTPS, FTP
B. Blocked: FTP, TFTP, HTTP, NetBIOS; Allowed: SFTP, SSH, SCP, HTTPS
C. Blocked: SFTP, TFTP, HTTP, NetBIOS; Allowed: SSH, SCP, HTTPS
D. Blocked: FTP, HTTP, HTTPS; Allowed: SFTP, SSH, SCP, NetBIOS


Answer: B. Blocked: FTP, TFTP, HTTP, NetBIOS; Allowed: SFTP, SSH, SCP, HTTPS

Computer Science & Information Technology

You might also like to view...

A(n) ____________________ file is a program module containing instructions that tell your computer how to perform specific tasks.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The statement that raises an exception is sometimes called the ___________ of the excep- tion.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Using only Armstrong’s axioms and the FDs

(a) AB ? C (b) A ? BE (c) C ? D give a complete derivation of the FD A ? D.

Computer Science & Information Technology

All queries in Access use:

A) HTML. B) XML. C) SQL. D) ACCDE.

Computer Science & Information Technology