Which of the following is a port used by TCP and UDP?
a. 23 Telnet
b. 25 SMTP
c. 53 DNS
d. 69 TFTP
C
You might also like to view...
A(n) ________ method of risk assessment needs to be applied across the business enterprise
Fill in the blank(s) with correct word
Case 13-2Jarrod is using Java to write binary search algorithms.Jarrod knows that if the length of his list is 4 to 7, the maximum number of steps needed to do a binary search is ____.
A. 1 B. 3 C. 4 D. 7
The Internet is migrating to Internet Protocol version 6 (IPv6), which usesĀ _____ addresses to provide for many more devices.
A. 32-bit B. 64-bit C. 128-bit D. 256-bit
The most engaging aspect of browsing the World Wide Web is the linking of information on related topics using ____________________, a nonlinear way of organizing information.
Fill in the blank(s) with the appropriate word(s).