1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikolay [14]
3 years ago
12

A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company’s firewall

to allow customers to retrieve a large file. Which of the following should the administrator perform BEFORE making the needed changes?
Document the reason for the request
Scan the file for malware to protect the sales department’s computers
Follow the company’s approval process for the implementation
Install a TFTP server for the customers to use for the transfer
Create a honeypot to store the file on for the customers to use
Write the SLA for the sales department authorizing the change
Computers and Technology
1 answer:
emmainna [20.7K]3 years ago
8 0

Answer:Document the reason for the request, Follow the company’s approval process for the implementation

Explanation:

The port 20 and 21 are used for the FTP connection, so before opening port 20 and 21 it is necessary to abide by the company data security policy which includes documenting the reason for the request and following company's approval process for its implementation.

You might be interested in
With a(n) ____ you can arrive at a scene, acquire the data you need, and return to the lab as quickly as possible.
valkas [14]

Answer:

Your answer is initial-response field kit

Explanation:

7 0
2 years ago
The city government of Los Angeles recently upgraded its information technology infrastructure​ and, for the first​ time, implem
Maru [420]

Answer:

The correct answer to the following question will be Option A (Open source software).

Explanation:

It's a type of software which is open to all we can download that software by the free of cost. Wamp, Apache server is one of the example of the open source software.

Any software accessible for alteration which is circulated because of its source code is known as Open source software. Open source permissions influence the way technology is used, researched, updated, and circulated by individuals. In fact, it give permission to code users for using this software for whatever use might desire.

Which ensures it includes a developer authorization to modify the script in any manner they want to:

  • Developers will patch glitches.
  • Change features.
  • Modify the app to suit their needs.

No other software available for the alteration is available in the option. So, the proper answer is Option A.

8 0
3 years ago
​________________________ are the main forms of direct and digital marketing. A. Mobile​ marketing, social media​ marketing, and
exis [7]

Answer:

A is the answer: Mobile marketing, Social media marketing and direct mail marketing

Explanation:

Option A is most likely correct because it is an intersection of both direct and digital marketing.

Option B is not the answer as direct response television marketing is listed

Option C is not the answer because online marketing and social media marketing belong to digital marketing while telemarketing belong the direct marketing

Option D is also not the answer as it just list the general category of marketing tools

Option E look like a good option but among the listed forms Social media marketing belong to digital marketing while telemarketing and kiosk marketing belong to digital marketing.

8 0
2 years ago
CODEHS- Please help!
Ksivusya [100]

Answer:

Revisiting "Build a Tower"

Recall in the last section how we made Karel make a tower of tennis balls. We told Karel to move() and turnLeft() and putBall() until we had a tower. At the end of the program, Karel was still at the top of the tower, like as in the picture below.

Stuck at top

Suppose that now we want Karel to come back down from the top of the tower. The first thing we need to do is get Karel facing in the right direction. One way to do this is to tell Karel

turnLeft();

turnLeft();

turnLeft();

And then tell Karel to

move();

move();

move();

back to the bottom of the tower.

However, telling Karel to turnLeft() three times is not very readable. That's a lot of writing when all we really want is to tell Karel to "turn right."

Explanation:

Hopefully it would help.

8 0
2 years ago
Your task is to identify three or more ways that big data is being collected on a regular basis, including one data collection m
attashe74 [19]

Answer:

Data is one of the most valuable resources today's businesses have. ... There are various data-gathering methods you can use with the help of your ... When it comes to data businesses collect about their customers, ... Third-party data offers much more scale than any other type of data, ... Big White Cursor.

Explanation:

4 0
3 years ago
Other questions:
  • Powerpoint assumes that the first slide in a new presentation is the
    10·1 answer
  • Help!!!! ASAP TIMED TEST 50 points!!!!
    7·1 answer
  • When did the mantle of the earth form
    14·2 answers
  • To save a file so that it can be opened on most computers, select the ____ option.
    10·2 answers
  • John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the dat
    10·1 answer
  • Write a program that reads an unspecified number of integers, determines how many positive and negative values have been read, a
    8·1 answer
  • ¿Qué es el Internet? ¿Cuál es el protocolo de Internet?
    11·1 answer
  • -) An attribute is a(n)?
    5·1 answer
  • Assume there is a 30-byte heap. The free list for this heap has two elements on it. One entry describes the first 10-byte free s
    15·1 answer
  • PLEASE I NEED HELP WITH THIS, IS FOR TODAY
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!