Matt, a security administrator, needs to Telnet into a router to change some configurations. Which of the following ports would need to be open to allow Matt to change the configurations?
A. 23
B. 125
C. 143
D. 3389
Answer: A. 23
You might also like to view...
Consider the LIBRARY relational database schema of Figure 4.6. Choose the appropriate action (reject, cascade, set to null, set to default) for each referential integrity constraint, both for the deletion of a referenced tuple, and for the update of a primary key attribute value in a referenced tuple. Justify your choices.
What will be an ideal response?
Data shaping happens after importing the information into Excel.
Answer the following statement true (T) or false (F)
Which of the following is a reason why Pete, a security administrator, would implement port security?
A. To inspect the TPC and UDP ports of incoming traffic B. To port C++code into Java bit-code in a secure manner C. To implement secure datacenter electronic access D. To limit the number of endpoints connected through the same switch port
Deleted email messages can be retrieved from the Windows Live Mail ____ folder until it is emptied manually.
A. Inbox B. Deleted Items C. Sent Items D. Drafts