1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesna [10]
2 years ago
15

A network administrator needs to allow employees to upload files to a remote server securely. What port should be allowed throug

h the firewall
Computers and Technology
1 answer:
V125BC [204]2 years ago
6 0

The port that the network administrator should use to allow employees to upload files to a remote server securely is Port 22.

<h3>What is Ports 22 in computer system?</h3>

A port is a virtual place in the operating system of a computer network where connections starts and ends.

Types of ports include:

  • well-known ports,
  • registered ports and
  • private ports.

Ports 22 is a common port number that is associated with secure shell login.

Port 22 was assigned to file transfer protocols(FTP) by the Internet Assigned Numbers Authority.

When employees needs to upload files to a remote server, Ports 22 should be used because it is secure and allows remote administration access to the server.

Learn more about computer ports here?

brainly.com/question/18133590

You might be interested in
What is the term for a web site that uses encryption techniques to protect its data?
vesna_86 [32]
The answer is secure site, I hope it helps.
8 0
3 years ago
Which XP practice prescribes that "the code [always be] written by two programmers at one machine"?.
damaskus [11]

Answer:

Pair Programming

Explanation:

In Extreme Programming XP, pair programming is a practice in which two programmers work together in a pair at one machine, when writing a code.

One of the two programmers is called the "driver" or developer who writes the code and supervises all the changes made to the program.

The other one is called an "navigator" or observer who provides ideas on how the program should be written, observes or reviews it the program, identify the issues or errors in the code, help in code simplifications.

The two developers implements the program, do coding, review the program and check each other's work. They both are required to be equally skilled in order to implement and test the code. This improves the process of the software development. By working in a pair and reviewing and testing the code together, they develop a better code.

8 0
4 years ago
Tarikh Firoz Shahi who is writer please answer me​
igomit [66]

Answer:

Zia-ud Din Barni

Explanation:

Mark me Brainliest.

5 0
3 years ago
Read 2 more answers
Fill in the blank to make the following true.<br> 2 ** 3 =
avanturin [10]

Answer:

2 ** 3 = 8

Explanation:

7 0
3 years ago
Read 2 more answers
Can you think of any other disruptive or nontraditional ways of earning that you could use the Internet?
denis23 [38]

Explanation:

The internet is a tool that has revolutionized the way communication is carried out. As it is a dynamic tool with easy access for any user, it is possible to use different platforms or social media to realize disruptive or non-traditional forms of earnings.

Some of them could be the dissemination of links that would generate advertising for other companies, or the free dissemination in social media of services, and several other innovations that use the internet as the main means to manufacture an extra income, such as online teaching, advertising for third parties etc.

7 0
4 years ago
Other questions:
  • AI vs IA like the difference
    12·2 answers
  • You are attempting to open a file containing a list of integer numbers, each on a separate line, and read them into Python as in
    6·1 answer
  • ____ is the use of networking technology to provide medical information and services.
    14·1 answer
  • Google's stated mission is to: establish itself as the most valuable media company in the world. organize the world's informatio
    11·1 answer
  • What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
    10·2 answers
  • In two to three sentences, describe how you would move a file.
    12·2 answers
  • I need help asap please :) I will mark brainliest for whoever gets the right answer! x
    5·1 answer
  • Which of the following domestic appliances does not use a magnet?
    10·2 answers
  • Why does a computer need programs? ​
    8·2 answers
  • In the program below, which two variables have the same scope?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!