1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reika [66]
4 years ago
6

After a new firewall is installed, users report that they do not have connectivity to the Internet. The output of the ipconfig c

ommand shows an IP address of 169.254.0.101. Which of the following ports would need to be opened on the firewall to allow the users to obtain an IP address? (Select TWO).
A. UDP 53
B. UDP 67
C. UDP 68
D. TCP 53
E. TCP 67
F. TCP 68
Computers and Technology
1 answer:
MissTica4 years ago
4 0

Answer:

B. UDP 67

C. UDP 68

Explanation:

In this scenario, after a new firewall is installed, users report that they do not have connectivity to the Internet. The output of the ipconfig command shows an IP address of 169.254.0.101. The ports that would need to be opened on the firewall to allow the users to obtain an IP address are both the UDP 67 and UDP 68. UDP is an acronym for user datagram protocol in computer networking and it is part of the transmission control protocol/internet protocol (TCP/IP) suite.

Generally, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.

Also, the UDP 67 and 68 ports is responsible for the connectionless framework which is typically being used by the dynamic host configuration protocol (DHCP) that is used to assign IP addresses to various computer users and manage their leases.

UDP 67 is the destination port for a DHCP server while the UDP 68 is the port number for the computer user (client).

<em>Hence, for the users to have access to the internet or internet connectivity both UDP 67 and 68 must be opened on the firewall. </em>

You might be interested in
In which situation is the person applying critical thinking skills?
Mama L [17]

I would say C is correct

7 0
3 years ago
Read 2 more answers
Encoding in the information processing theory is the process of _____
Katyanochek1 [597]

Encoding in the information processing theory is the process of inputting of information into the memory system.

<h3>What is encoding?</h3>

Encoding is an act or a system method that is used in the inputting of information into the computer memory system.

It entails the storage in the retention of encoded information. After encoding is the Retrieval method that is the act of getting the information out of memory.

Learn more about encoding from

brainly.com/question/3926211

8 0
2 years ago
List 10 programs or applications on your computer other than any Microsoft office programs
Fofino [41]
Dropbox
Mozilla Firefox, Google Chrome
Gmail, Mozilla Thunderbird
CDburnerXP
Putty, Netflix,
Paint.net, Filezilla
3 0
3 years ago
Code hs spell it out 7.2.6
fgiga [73]

what do you mean can you say it more clear?

4 0
3 years ago
What is desktop computer? <br> ​
butalik [34]

Answer:

a computer suitable for use at an ordinary desk.

noun: desktop computer

"a new low-end desktop"

Explanation:

please mark me as a brainly

3 0
3 years ago
Read 3 more answers
Other questions:
  • Which layer of the osi model defines services to segment and reassemble data for individual communications between end devices?
    15·1 answer
  • Which statement accurately describes the process for storing AutoRecovered files?
    7·2 answers
  • What are three reasons teens might start drinking alcohol??
    7·2 answers
  • Your company has 1,000 users in a Microsoft Office 365 subscription. A Power BI administrator named Admin1 creates 20 dashboards
    14·1 answer
  • There are only three active stations in a slotted aloha network: a, b, and
    6·1 answer
  • What is an end user license (EULA) agreement an example of?
    9·2 answers
  • What game is the best for racing and modifying cars
    10·1 answer
  • D) Software which is basically language translation software.​
    11·1 answer
  • Tyler is feeling overwhelmed by the programming assignment from his supervisor and wants to break the task down into smaller, mo
    5·2 answers
  • an attacker is attempting to crack a system's password by matching the password hash to a hash in a large table of hashes he or
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!