Matt, a security administrator, needs to Telnet into a router to change some configurations. Which of the following ports would need to be open to allow Matt to change the configurations?

A. 23
B. 125
C. 143
D. 3389


Answer: A. 23

Computer Science & Information Technology

You might also like to view...

Consider the LIBRARY relational database schema of Figure 4.6. Choose the appropriate action (reject, cascade, set to null, set to default) for each referential integrity constraint, both for the deletion of a referenced tuple, and for the update of a primary key attribute value in a referenced tuple. Justify your choices.

What will be an ideal response?

Computer Science & Information Technology

Data shaping happens after importing the information into Excel.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is a reason why Pete, a security administrator, would implement port security?

A. To inspect the TPC and UDP ports of incoming traffic B. To port C++code into Java bit-code in a secure manner C. To implement secure datacenter electronic access D. To limit the number of endpoints connected through the same switch port

Computer Science & Information Technology

Deleted email messages can be retrieved from the Windows Live Mail ____ folder until it is emptied manually.

A. Inbox B. Deleted Items C. Sent Items D. Drafts

Computer Science & Information Technology