The FTP protocol is relatively easy to proxy; the firewall decides, for example, whether an outsider should be able to access a particular directory in the file system and issues a corresponding command to the inside file manager or responds negatively to the outsider. Other protocols are not feasible to proxy. List three protocols that it would be prohibitively difficult or impossible to proxy

Explain your answer.

What will be an ideal response?


Protocols
that
have
a
complex
behavior,
such
as
HTTP.

Computer Science & Information Technology

You might also like to view...

Answer the following questions true (T) or false (F)

1. A function’s return type may not be an array. 2. typedef is a reserved word. 3. An array can use an enumerated type for a subscript.

Computer Science & Information Technology

These devices are typically associated with WANs.

What will be an ideal response?

Computer Science & Information Technology

Setting the compression attribute __________. (Choose all that apply.)

a. decreases the amount of space used by all the files stored within a folder b. cannot be done prior to encryption c. decreases a file's size d. is not recommended and should not be considered

Computer Science & Information Technology

In the Edit Links dialog box, if a workbook referenced by a hyperlink is lost or moved, ________ will display.

A. Error: Link Broken B. #ERROR C. Error: Manually find link? D. Error: Source not found

Computer Science & Information Technology