1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allochka39001 [22]
1 year ago
10

a systems administrator is trying to harden an external facing dns server and wants to disable every port except for dns. which

port should they leave open?
Computers and Technology
1 answer:
stira [4]1 year ago
5 0

Since the systems administrator is trying to harden an external facing DNS server and wants to disable every port except for dns. the port should they leave open is 802.1X

<h3>What DNS server do you use?</h3>

A server known as the Domain Name System (DNS) Server is used primarily for mapping hostnames for websites, such as example.com, to their corresponding Internet Protocol or IP addresses.

With 802.1x, you can gain secure access to almost any network port (wired or wireless). Actually, the 802.1x protocol isn't even a wireless protocol. It describes a method for port authentication that can be applied to nearly any network connection, whether wired or wireless.

Learn more about systems administrator from

brainly.com/question/27129590
#SPJ1

You might be interested in
Programs which were typically reserved for college-level classes such as computer animation and CAD programs are now being appli
Irina-Kira [14]
Answer: I think C


Step by step explanation:
8 0
3 years ago
Describe the big data life cycle. Which step do you think is most useful and why?
Step2247 [10]

Answer:

Big data lifecycle consists of four phases: data collection, data storage, data analysis, and knowledge creation. Data collection phase consists of collecting data from different sources. In this phase, it is important to collect data from trusted data sources.

I think business cases analysis is the most useful step because (BCA) provides a best-value analysis that considers not only cost but other quantifiable and non-quantifiable factors supporting an investment decision. This can include but is not limited to, performance, producibility, reliability, maintainability, and supportability enhancements

Explanation:

mark me brainliest

7 0
3 years ago
54 points!!! Cyber security
Veseljchak [2.6K]

Answer:

a

Explanation:

3 0
3 years ago
What does the word complacency mean ?
bulgar [2K]

Answer:

a feeling of smug or uncritical satisfaction with oneself or one's achievements.

Explanation:

8 0
4 years ago
Read 2 more answers
What is an algorithm? An executable file that has been converted into machine language A set of markup instructions A set of ins
mario62 [17]

Answer:

A set of instructions to meet a requirement of some kind

Explanation:

An algorithm is a set of instructions to meet a requirement of some kind, not all the algorithm are for computers, we can form an algorithm of how to make a cake.

5 0
3 years ago
Other questions:
  • Which view is used to allow a publisher to view facing pages of a publication at the same time?  NormalMaster PageTwo-Page Sprea
    9·1 answer
  • Gary lives in an area that receives high rainfall throughout the year. Which device would be useful to him to maintain his compu
    10·2 answers
  • Microbes that enter the body, causing disease, are<br>known as​
    13·1 answer
  • If a laptop is getting no power while plugged in, which hardware part often needs to be replaced?
    5·1 answer
  • Refer to the following statement: “We have implemented several IT solutions:
    14·1 answer
  • Create a page using PHP for a business website that will ask the user to enter his or her name into text boxes and will display
    5·1 answer
  • How do you use VMware Fusion to make a Tip Calculator?
    10·1 answer
  • Write a function that will sum all of the numbers in a list, ignoring the non-numbers. The function should takes one parameter:
    8·1 answer
  • Explain the role and importance of ict in daily life ?​
    7·1 answer
  • ________ involves disconnecting individual users from their selected internet service providers and redirecting them to illegiti
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!