1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
3 years ago
8

The web development team is having difficulty connecting by ssh to your local web server, and you notice the proper rule is miss

ing from the firewall. What port number would you open on your webserver?
a. Port 21
b. Port 22
c .Port 25
d. Port 80
e. Port 443
Computers and Technology
1 answer:
joja [24]3 years ago
7 0

Answer:

Option b (Port 22) seems to the appropriate choice.

Explanation:

<u>Below seem to be some measure you should take to correct this mistake.</u>

  • Verify whether Droplet's host IP address seems to be right.  
  • Verify existing connection supports communication over all the utilized SSH port. Any access points can be able to block port 22 and sometimes customized SSH. For illustration, you could do this by checking different hosts who used the same port, using only a recognized working SSH connection. These could help you identify unless the current problem is not particular to clients' Droplet.
  • Authenticate the Droplet configuration settings. Verify that they're not being configured to DROP 's preferred policy, and do not apply the port to require connectivity.

The SSH server also operates on port 22, by default.  

Other choices don't apply to the specified scenario. So that the argument presented above will be appropriate.

You might be interested in
Intellectual property piracy has gotten a small boost from the increasing availability of counterfeit goods through Internet cha
Aliun [14]

Answer:

The answer is "Option B".

Explanation:

Intellectual property is protected by law in which property, copyright, and trademarks, are uses, that enable you to gain individuals' popularity or personally benefit according to what they create.

  • It is a program that helps to create an environment, in which imagination and technology are used.
  • It will change the growth by striking a balance between innovator rights and wider public interest.
3 0
3 years ago
Why is two way communication important for the new communications network?
NARA [144]

Answer:

The answer is below

Explanation:

Two way communication is a form of communication in which both the sender and receiver exchanges messages over a medium of exchange, which could be through mails, email, telephones etc.

Therefore, Two way communication is important for the new communications network based on various reasons, amongst which are:

1.  It serves as medium or means of getting feedback from consumers on what they want concerning services.

2.  It helps to get or samples opinions of the targeted audience's needs.

3.  It enhances the customers - service providers' cordial relationship in terms of quality service delivery.

8 0
3 years ago
To output age for the user which of the following you need to use?
koban [17]

Answer:

D

Explanation:

A is declaring a variable

B is getting input from the user and storing it in variable age

C is outputting the word "age" to the screen

D is outputting the word "age" to the screen and then outputting the value of the age variable immediately after which is correct.

6 0
3 years ago
Technician a says that impact sockets have thicker walls than conventional sockets. Technician b says that impact sockets have a
Ray Of Light [21]

Impact sockets are sockets used to cope with the vibration caused by the impact of the hammer on the anvil. Both technicians are right. It is true that impact sockets have thicker walls than conventional sockets, so technician A is right. But it is also true that impact sockets have a black oxide finish, so the technician B is also right.

4 0
3 years ago
Where does the CPU store its computations
mario62 [17]

Answer:

In main memory

Explanation:

Hope this helps

8 0
3 years ago
Read 2 more answers
Other questions:
  • What is a “spoof” of an ad ?
    8·2 answers
  • What is a potential benefit of using a VPN? Select one: a. You could increase your level of privacy by guarding your real IP add
    9·1 answer
  • When is it most appropriate to quote from an e-mail message in a response?
    9·2 answers
  • If a user wished to insert a triangle or a callout figure in a document, he or she should select the _____ option.
    8·1 answer
  • Manuel is working on a project in Visual Studio. He wants to keep this program showing on the entire desktop, but he also needs
    13·1 answer
  • What is a graphical user interface (GUI)?
    10·1 answer
  • What are some options available when you click File and then Print? (Multiple Choice)
    5·1 answer
  • Which of the following is not a Nintendo game character?
    6·2 answers
  • Anyone know what I’m supposed to do?
    11·1 answer
  • A __________ is a sequence of characters.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!