During a penetration test from the Internet, Jane, the system administrator, was able to establish a connection to an internal router, but not successfully log in to it. Which ports and protocols are MOST likely to be open on the firewall?

A. 21
B. 22
C. 23
D. 69
E. 3389
F. SSH
G. Terminal services
H. Rlogin
I. Rsync
J. Telnet


Answer:
B. 22
C. 23
F. SSH
J. Telnet

Computer Science & Information Technology

You might also like to view...

In the function declaration shown, the mechanism used to call this function is known as: double pow(double base, double exp);

a. pass by name b. pass by value c. pass by name d. call by name

Computer Science & Information Technology

What would be the time complexity of the size operation for each of the implementations if there were not a count variable?

What will be an ideal response?

Computer Science & Information Technology

Display student Jose Diaz’s faculty advisor’s name and phone number.

Use the Indo–US College database tables to design the following subqueries. (Use the spooling method to capture all queries and results in the CHAP8SP2.LST file)

Computer Science & Information Technology

When you increase the size or resolution of an image, Photoshop is running complex ____ to create that new data.

A. matrices B. indices C. algorithms D. vectors

Computer Science & Information Technology