A server has recently been configured as a network firewall. After the firewall was configured, users could no longer access a remote server. Which of the following, if properly configured on the firewall, will allow users to have secure access to the remote server? (Select TWO).
A. Allow TCP port 21
B. Allow TCP port 22
C. Allow TCP port 23
D. Allow TCP port 25
E. Allow TCP port 161
F. Allow TCP port 3389
Answer:
B. Allow TCP port 22
F. Allow TCP port 3389
Computer Science & Information Technology
You might also like to view...
The ____ data type allows an element to contain any text string.
A. pcdata B. text C. alpha D. string
Computer Science & Information Technology
Data values do not need to be tested or validated before they are used.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
________ displays thumbnails of all of the slides in a presentation
A) Normal view B) Reading view C) Slide Sorter view D) Notes page view
Computer Science & Information Technology
The process of collecting detailed information about devices in a network is often referred to as __________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology