_____ is used to set up applications that require more than one port. When the firewall detects activity on outbound port, it opens the inbound port for a set period.

A. Port triggering
B. Port forwarding
C. Port mirroring
D. Firewall


Answer: A. Port triggering

Computer Science & Information Technology

You might also like to view...

Give an example of a schedule produced by a nonstrict two-phase locking concurrency control that is not recoverable.

What will be an ideal response?

Computer Science & Information Technology

This chapter describes how Jean-Dominique Bauby wrote a book by winking. Explain what he was doing in terms of PandA concepts as he is being presented the alphabet.

What will be an ideal response?

Computer Science & Information Technology

To convert a report to a Web page, you begin by clicking the More button in the:

A) Export group on the External Data tab. B) Reports group on the External Data tab. C) Reports group on the Convert tab. D) Export group on the Convert tab.

Computer Science & Information Technology

Which of the followings is the correct CSS syntax that specifies the text color of all elements that has a class attribute equal to navmenu?

a. navmenu {color:#000000}; b. .navmenu {color:#000000}; c. #navmenu {color:#000000}; d. navmenu {color:#000000};

Computer Science & Information Technology