1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
3 years ago
7

A network technician configures a firewall’s ACL to allow outgoing traffic for several popular services such as email and web br

owsing. However, after the firewall’s deployment, users are still unable to retrieve their emails. Which of the following would BEST resolve this issue?A. Allow the firewall to accept inbound traffic to ports 25, 67, 179, and 3389B. Allow the firewall to accept inbound traffic to ports 80, 110, 143, and 443C. Set the firewall to operate in transparent modeD. Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123
Computers and Technology
1 answer:
Cerrena [4.2K]3 years ago
3 0

Answer: (B) Allow the firewall to accept inbound traffic to ports 80, 110, 143, and 443

Explanation:

Port 80 is used by HTTP, 110 by pop3 to retrieve emails from web servers, 143 by imap for internet messaging and 443 is used for TCP for websites using SSL. So if the firewall is allowed to accept inbound traffic to these ports 80,110,143 and 443 then it would be possible to retrieve emails.

You might be interested in
What is the location used by users to configure delegate access on their own mailboxes? Backstage view > Account Settings Bac
abruzzese [7]

Answer:

A: Backstage view > Account Settings

Explanation:

7 0
3 years ago
A DTP firm has published and printed flyers for an upcoming fundraising event. In which section of the flyer would you find the
Annette [7]
Typically the contact details for the firm would be at the bottom of the flyer.

This is to allow room for the main event itself to be advertised in top and central area of the flyer real-estate.
7 0
3 years ago
Read 2 more answers
A shop will give discount of 10% if the cost of purchased quantity is more than 1000. Ask user for quantity suppose, one unit wi
UkoKoshka [18]

Answer:

The program in Python is as follows:

qty = int(input("Quantity: "))

price = 100 * qty

if qty >1000:

    price = (100 - 0.10 * 100) * qty

print("Cost: "+str(price))

Explanation:

This prompts the user for the quantity

qty = int(input("Quantity: "))

This calculates the price or cost, without discount

price = 100 * qty

This checks if the quantity is greater than 1000

if qty >1000:

If yes, this calculates the price or cost, after discount

    price = (100 - 0.10 * 100) * qty

This prints the calculated cost

print("Cost: "+str(price))

4 0
3 years ago
2. When a business practices offensive behavior, you have many options. The option with the loudest voice is
Andreas93 [3]
—-_-__-____- _—-_- -__-_-____-__




___-_-_ _- —|
4 0
2 years ago
The ____ is the period of time within which systems, applications, or functions must be recovered after an outage. Select one:
scZoUnD [109]

Answer:

c. recovery time objective                                                  

Explanation:

  • Recovery time objective (RTO) is the maximum acceptable duration permitted between an unfortunate loss or failure and the restoration of normal operations and services.
  • According to the RTO, the systems, applications or operations must be restored within a targeted time period after a disaster, to avoid unacceptable outcomes of the disruption.
  • So a business process must be recovered within this period of time.
  • It measures how much a failure affects the normal operations, applications and systems and RTO is measures in time units like seconds minutes hours or days.
  • In simple words RTO refers to the time you need to restore system, applications and data.
  • For instance a 2-hour RTO refers to restore and get operations or services back to running within 2 hours of the service failure or outrage.
6 0
3 years ago
Other questions:
  • Which of the following describes a hash algorithms ability to avoid the same output from two guessed inputs?A. Collision avoidan
    12·1 answer
  • Which software application offers a variety of templates for creating reports, flyers, and newsletters that you can access withi
    7·1 answer
  • 1- Which of the following is the java keyword used to declare a class?
    5·2 answers
  • Riya wants to save her project work in an external device so that she can show it to her class teacher. Help her to choose the d
    13·2 answers
  • What are the advantages of saving files in a cloud? <br>Please help!! ​
    11·2 answers
  • Any action that causes harm to your computer is called a
    15·1 answer
  • If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is l
    8·1 answer
  • Imagine that a team of scientists test a certain hypothesis, and the experimental results show that it is false.
    6·1 answer
  • What is not recyclable in a<br> hybrid car<br> hydrogen car<br> petrol car
    15·1 answer
  • 236. A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!