1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
9

Suppose you want your firewall to block all incoming Telnet connections but to allow outbound Telnet connections. One approach w

ould be to block all inbound packets to the designated Telnet port (23). We might want to block inbound packets to other ports as well, but what inbound TCP connections must be permitted in order not to interfere with outbound Telnet
Computers and Technology
1 answer:
Vera_Pavlovna [14]3 years ago
5 0

Answer:

Another way to block all inbound packets is to use the firewall layer of the circuit.

Explanation:

The firewall circuit layer is a firewall containing a table with four fields, mainly such as source port, destination port, source IP address, and destination IP address.

They are containing mainly the addresses or the ports that need to be blocked.   So we want to block all inbound packets, and also set the source port to 23 while the rest is set to zero, meaning that all inbound packets are blocked.

You might be interested in
Pls help
kvasek [131]

Answer:

I think its B bookName! = "Brave New World"

Explanation:

4 0
3 years ago
Read 2 more answers
Order the following routine maintenance tasks from most to least important when securing a computer. a. Verify anti-malware sett
spin [16.1K]

Answer:

The following are the order of the routine maintenance tasks that is C, A, B, D

Explanation:

For securing the computer system the user has to follow some steps related to the routine maintenance tasks.

  • Firstly, the user has to validate the settings on the Windows Update.
  • Then, they have to validate the settings on the anti-malware software.
  • Then, the user has to validate the setting related to the file-sharing system.
  • Finally, they have to validate the frequent optimization of hard drives or hard disks.
7 0
3 years ago
You need to know the MAC address of a Windows 8 computer. How can you accomplish this?
Gre4nikov [31]

1.press window key + R

2.type cmd and press enter

3. write "ipconfig /all" without quotes and press enter

4. look for physical address word

that's your Mac address

6 0
3 years ago
Which of the following is true of how the Internet has responded to the increasing number of devices now using the network? a) T
zalisa [80]

Answer:

A

Explanation:

The internet protocols are changed every year to adapt to the new devices that have been connected to the network. Back in the 1990s, most traffic used a few protocols.  Pv4 routed packets, TCP turned those packets into connections, SSL (later TLS) encrypted those connections, DNS named hosts to connect to, and HTTP was often the application protocol using it all.

For many years, there were negligible changes to these core Internet protocols; HTTP added a few new headers and methods, TLS slowly went through minor revisions, TCP adapted congestion control, and DNS introduced features like DNSSEC. The protocols themselves looked about the same ‘on the wire’ for a very long time (excepting IPv6, which already gets its fair amount of attention in the network operator community.)

As a result, network operators, vendors, and policymakers that want to understand (and sometimes, control) the Internet have adopted a number of practices based upon these protocols’ wire ‘footprint’ — whether intended to debug issues, improve quality of service, or impose policy.

Now, significant changes to the core Internet protocols are underway. While they are intended to be compatible with the Internet at large (since they won’t get adoption otherwise), they might be disruptive to those who have taken liberties with undocumented aspects of protocols or made an assumption that things won’t change.

8 0
3 years ago
Read 2 more answers
What is something about online conferencing that you understand better now. <br> What did you learn?
Mazyrski [523]

Answer:

man this question is really about your personal experience but i'll try my best to answer this

Explanation:

onnline Web Conferencing is used by businesses and now schools who went to online because of the virus. for businesses i learned they use it to present and share with online collaboration on different applications including documents, web sites, data files, video, emails, and reduce the time and cost of business travel for meetings. i understand now that online conferencing can be used for Applications for web conferencing include meetings, training events, lectures, or presentations from a web-connected computer to other web-connected computers.

4 0
3 years ago
Other questions:
  • On Brainly, how can I change my username? from halfsidepancake​
    6·2 answers
  • Sue needs to add a header and a footer to a presentation. Which process should she use to do this?
    10·2 answers
  • Google Glass uses a projector that bounces a beam of light off a prism and projects the image directly on your ________. field o
    14·1 answer
  • Which of the following statements is false? a. InputStream and OutputStream are abstract classes for performing byte-based I/O.
    7·1 answer
  • 1)When the liquid is spun rapidly, the denser particles are forced to the bottom and the lighter particles stay at the top. This
    10·1 answer
  • Which cable standard is a standard for newer digital cable, satellite, and cable modem connections?
    11·1 answer
  • If a employee has a grade grater than or equal to 18, then he she will get 50% bonous on the basic pay. Otherwise, the employee
    5·1 answer
  • Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual whi
    9·1 answer
  • For this activity, you will practice being both proactive and reactive to bugs. Both are necessary to get rid of errors in code.
    5·1 answer
  • We begin with a computer implemented in a single-cycle implementation. When the stages are split by functionality, the stages do
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!