Which of the following virtual ports is used to accept e-mail?
A. 80
B. 24
C. 110
D. 495
Answer: C
You might also like to view...
Which of the following is not a primitive type?
a. char b. float c. String d. int
Which of the following is the ability to verify that the data received did in fact come from the named source?
A. Access control B. Connectionless integrity C. Data origin authentication D. Confidentiality
When configuring a switch with system ID extension enabled, what STP priority multiple must be used?
A) 4096 B) 1024 C) 2048 D) 9216
What is the output of the following program?
#include
A. 2 3 2 3 B. 2 3 3 5 8 C. 3 5 8 3 5 8 D. 5 8 3 5 8