1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
posledela
3 years ago
9

You need to prevent the use of tftp through your firewall. which port would you block?

Computers and Technology
1 answer:
xz_007 [3.2K]3 years ago
4 0
Hello <span>Huber5598 </span>


Question: <span>You need to prevent the use of tftp through your firewall. which port would you block?
</span><span>
Answer: You should block UDP port 69 to block TFTP


I Hope This Helps You :-)
-Chris</span>
You might be interested in
Nadia has inserted an image into a Word document and now would like to resize the image to fit the document better. What is the
Mnenie [13.5K]

Answer:

use of keyboard shortcut sizing handles

7 0
3 years ago
Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended
sergiy2304 [10]

Answer:

SQL injection

Explanation:

SQL injection is a vulnerability in databases that occurs when user input is not properly validated. Hackers are able to input SQL query statements to bypass the use of the actual user name and password to gain access to the account.

Using placeholders in programmed SQL statements mitigates the effects of SQL injection.

6 0
3 years ago
What can be done in order to secure a WLAN/wireless access point?
polet [3.4K]

Answer:

this may help "Change default passwords. ...

Restrict access. ...

Encrypt the data on your network. ...

Protect your Service Set Identifier (SSID). ...

Install a firewall. ...

Maintain antivirus software. ...

Use file sharing with caution. ...

Keep your access point software patched and up to date."

Explanation:

4 0
3 years ago
Which data table display compares report metrics to the website average?
lozanna [386]
The appropriate response is Pivot. Correlation shows a bar graph plotting the execution of the chose measurements in respect to the site normal. Turn tables are not made naturally. A rotate table enables you to separate the essentialness from a vast, point by point dataset.
3 0
4 years ago
What is a Joint Staff approved, standardized communications link that is suitable for the transmission of digital information an
djverab [1.8K]

Answer:

TDL(Tactical Data Link).

Explanation:

TDL is the authorized, formalized communication connection for electronic information transfer and it is identified by formalized communication types and transmitting features.

It is used by the join staff for the standardized connection or also for the communication.

So, the following answer is correct according to the scenario.

7 0
3 years ago
Other questions:
  • Assume that the myname.txt file is currently closed. write the code segment that opens the file without erasing it, write anothe
    13·1 answer
  • What piece of equipment is NOT a tool that would be considered appropriate equipment for on-site visits? a. multimeter b. flashl
    14·1 answer
  • What are the five layers in the internet protocol stack? What are the principal responsibilities of each of these lay?
    9·1 answer
  • A. What sectors are used with Foo?
    8·1 answer
  • What are the long-term consequences for John’s health and wellness if he continues to use this technique
    15·1 answer
  • Which is better Play Station Xbox or PC
    14·2 answers
  • Reality and computer-generated simulations can solve a lot of problems
    14·1 answer
  • Which appears at the intersection of a column and row?
    5·1 answer
  • When an item in a menu is black, it means that _____.
    7·1 answer
  • which type of virtual machine (vm) takes advantage of unused capacity in data centers at a much lower cost than regular vms of s
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!