Ports are typically closed via ____.

A. routers
B. gateways
C. firewalls
D. proxies


Answer: C

Computer Science & Information Technology

You might also like to view...

A centralized global deadlock detector holds the union of local wait-for graphs. Give an example to explain how a phantom deadlock could be detected if a waiting transaction in a deadlock cycle aborts during the deadlock detection procedure.

What will be an ideal response?

Computer Science & Information Technology

Which of the following is NOT a tab in Access 2013?

A) Create B) Home C) Format D) File

Computer Science & Information Technology

A ________ can find bad sectors on your hard drive and block access to them.

a. repair program b. search utility c. disk cleanup utility d. disk scanning program

Computer Science & Information Technology

Which of the following IEEE standards has a maximum bandwidth of 54Mbps operating at 5GHz?

A. 802.11g B. 802.11a C. 802.11b D. 802.11

Computer Science & Information Technology