1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
3 years ago
7

A network technician configures a firewall’s ACL to allow outgoing traffic for several popular services such as email and web br

owsing. However, after the firewall’s deployment, users are still unable to retrieve their emails. Which of the following would BEST resolve this issue?A. Allow the firewall to accept inbound traffic to ports 25, 67, 179, and 3389B. Allow the firewall to accept inbound traffic to ports 80, 110, 143, and 443C. Set the firewall to operate in transparent modeD. Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123
Computers and Technology
1 answer:
Cerrena [4.2K]3 years ago
3 0

Answer: (B) Allow the firewall to accept inbound traffic to ports 80, 110, 143, and 443

Explanation:

Port 80 is used by HTTP, 110 by pop3 to retrieve emails from web servers, 143 by imap for internet messaging and 443 is used for TCP for websites using SSL. So if the firewall is allowed to accept inbound traffic to these ports 80,110,143 and 443 then it would be possible to retrieve emails.

You might be interested in
A personal business letter is a letter that is ____.
Simora [160]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

8 0
3 years ago
Can someone help me i need to write something for cyber bullying
snow_tiger [21]

cyber bullying is when there is a minor on both ends and when a person has the time to go online to pick on you


3 0
3 years ago
Read 2 more answers
Missy creates a personal budget. She enters her current savings account balance in cell D3. In cell A3, she calculates her incom
sammy [17]
D3+(A3-B3) If you think of the future income and expenses then you can infer the expenses will lower the income amount so we use parenthesis and since there is money already in the account you would simply add that to the future total. <span />
7 0
3 years ago
Read 2 more answers
Question 1 (1 point)
S_A_V [24]

Answer:

I'm not 100% on the answers . . .

Explanation:

1. A, 2. C, 3. D, 4. A, 5. D, 6. A & B, 7. False, 8. D, 9. D, 10. D

7 0
3 years ago
Read 2 more answers
Readability is the level of vocabulary used on the page. True or false
konstantin123 [22]

Answer:

FALSE....john has no idea what hes talking about. i knew this was false yet i looked it up and got it wrong anyway because of john its freaking false

Explanation:

8 0
3 years ago
Other questions:
  • A Web ____ is a software program that retrieves the page and displays it. Select one:
    5·1 answer
  • Software that manages and supports the resources of a computer is known as?
    10·1 answer
  • What is used for World Wide Web?
    7·1 answer
  • ___________is a security strategy that applies multiple layers of defense because there is an assumption that any single protect
    12·1 answer
  • What tool do you use to secure remote access by users who utilize the internet??
    7·1 answer
  • The source code of a java program is first compiled into an intermediate language called java ____, which are platform-independe
    8·1 answer
  • HIPAA requires the following controls for medical records: A. Encryption of all data B. Technical safeguards C. Physical control
    12·1 answer
  • Design a flowchart for an algorithm which adds prim numbers starting from 1 up to 50. Change
    9·1 answer
  • Please help
    11·1 answer
  • Indica si los elementos de las imagenes son una materia prima o un material elaborado
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!