1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikolay [14]
3 years ago
12

A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company’s firewall

to allow customers to retrieve a large file. Which of the following should the administrator perform BEFORE making the needed changes?
Document the reason for the request
Scan the file for malware to protect the sales department’s computers
Follow the company’s approval process for the implementation
Install a TFTP server for the customers to use for the transfer
Create a honeypot to store the file on for the customers to use
Write the SLA for the sales department authorizing the change
Computers and Technology
1 answer:
emmainna [20.7K]3 years ago
8 0

Answer:Document the reason for the request, Follow the company’s approval process for the implementation

Explanation:

The port 20 and 21 are used for the FTP connection, so before opening port 20 and 21 it is necessary to abide by the company data security policy which includes documenting the reason for the request and following company's approval process for its implementation.

You might be interested in
Brainless is one the way if you help
V125BC [204]

Answer:

1. x - 6

2. p - ? = 7

i chose these equations because

a number - 6 = the weight of your backpack.

p - an unknown number without a substitute variable = slices of bread left.

3 0
2 years ago
What is powerpoint in a presentation?
Hitman42 [59]
Powerpoint is slides to your subject, whatever your sub is you can go to google slides and make you powerpoint there. you might have make a email account im not sure.

hope this helped!
4 0
2 years ago
Read 2 more answers
You need to design a data storage scheme for Hayseed Heaven library data system. There are several hundred thousand large data r
Alekssandra [29.7K]

Answer:

Make use of hash tables

Explanation:

The appropriate thing to use for this should be a hash table.

A Hash Table can be described as a data structure which stores data in an associative manner. In a hash table, data is stored in an array format, where each data value has its own unique index value. Access of data becomes very fast if we know the index of the desired data. So we can perform Hashing on ISBN Number since its unique and based on the Hash Function w ecan store the Information record.

There is no requirement for printing the file in order - HashTables dont store the data in order of insertions, so no problems with that

It becomes a data structure in which insertion and search operations are very fast irrespective of the size of the data. So Querying books details can be fast and searching will take less time.

It can also be pointed out that it wont be too expensive for Hardware implemtation as HashTables stores data based on Hash Functions and memory consumption is also optimal which reduces memory wastages.

7 0
3 years ago
How long is the ap computer science principles exam
slava [35]

Answer: The exam is 2 hours long.

Explanation:

8 0
2 years ago
Read 2 more answers
Argue whether we can infer anything about a candidate’s ability to work in a professional environment based on his or her resume
IceJOKER [234]

Answer:

when dressing feaded back is postive and then list areas of inprovmenr to met the job requirements

Explanation:

3 0
2 years ago
Other questions:
  • Greg works for an online games development company. He is not a net freak, but occasionally he visits online literature sites an
    7·1 answer
  • Outline the steps necessary to prepare a storage device for storing files. Identify and briefly describe the tools used to prepa
    7·1 answer
  • In an oligopolistic market, consumer choice is?
    12·2 answers
  • Which of these is one of the primary concerns for protecting your family when online?
    9·2 answers
  • Write a program to complete the task given below: Ask the user to enter any 2 numbers in between 1-10 and add both of them to an
    8·1 answer
  • For what reason can security risks never be fully eliminated?​
    7·1 answer
  • What is the code for forgot password on messenger​
    9·1 answer
  • Resumen sobre Tailandia​
    10·1 answer
  • What is the output of the following program? If there is any problem, how can
    13·1 answer
  • You have a filtered dataset for Customer Sales with some null value rows. You want to remove these rows completely. How will you
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!