1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
3 years ago
13

A Windows user contacted the help desk with a problem that requires the technician to connect to the remote computer using Remot

e Assistance to view a very detailed and cryptic error message on the user’s desktop. Each attempt the technician makes to connect to the remote computer results in a message stating the connection was refused.
Which of the following protocol and port number combinations should be opened on the remote computer’s firewall to allow this connection?

Group of answer choices

1. SSH, port 22
2. Telnet, port 23
3. DNS, port 53
4. RDP, port 3389
Computers and Technology
1 answer:
Yuri [45]3 years ago
6 0

Answer:

Option 4 i.e., RDP, port 3389.

Explanation:

The User has informed the helpdesk with such an issue that involves the specialist to link to the remote server utilizing Remote Assist to access the user's screen with a quite informative and ambiguous error. Every attempt made by the technician to link to the virtual server outcomes in a message saying that the link has been denied.

So the combinations of RDP and port 3389 would be enabled on the remote computer’s firewall to allow this connection.

You might be interested in
Based on the condition.
e-lub [12.9K]

Answer:

A subroutine is a block of statements that carries out one or more tasks. ... they share all variables with the rest of the main program. ... Once you have defined a function in your program, you may use it in any appropriate expression, such as: ... Thus, functions can- not change the values of the arguments passed to them.

Explanation:

5 0
3 years ago
A lot of computations involve processing a string one character at a time. Often they start
dedylja [7]

Answer:

The last character in the string processed is "t".

Explanation:

The index start from 0 and the len(fruit) is 5.

When index is 0 which is less than 5; "f" is printed

When index is 1 which is less than 5; "r" is printed

When index is 2 which is less than 5; "u" is printed

When index is 3 which is less than 5; "i" is printed

When index is 4 which is less than 5; "t" is printed

When index is 5, the condition is false; so the loop content is not executed.

Therefore, the last character traversed in the string "fruit" is "t".

3 0
3 years ago
This may vary in your state, but S/P2 recommends keeping all environmental documentation a minimum of:
Anettt [7]

A would be the answer!!!...

4 0
3 years ago
Read 2 more answers
Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity an
podryga [215]

Answer:

Payment Card Industry Data Standard(PCI DSS).

Explanation:

The online payment acceptance through credit cards is governed by the Payment Card Industry Data Standard (PCI DSS) and it also includes the provisions that shoulde be implemented by gwen's company before accepting any transaction through credit cards.

8 0
3 years ago
Which of these is the longest geologic time frame?
snow_lady [41]
The largest geologic time frame is Eon.
4 0
3 years ago
Read 2 more answers
Other questions:
  • On the pie chart below, which “slice” represents 30% of the budget?
    8·1 answer
  • Where is line-of-sight Internet common?<br> In space<br> Outdoors<br> Inside<br> In businesses
    10·1 answer
  • How does Frankenstein feel about his creation?
    15·1 answer
  • What type of network is capable of delivering voice, video streams, text, and graphics between many different types of devices o
    15·1 answer
  • To implement the various placement algorithms discussed for dynamic partitioning (see Section 7.2 ), a list of the free blocks o
    11·1 answer
  • To ____ a public member function of a base class in the derived class, the corresponding function in the derived class must have
    12·1 answer
  • . Explain and demonstrate the functionality of timer devices in an embedded system[
    9·1 answer
  • All dogs = 199999990158161231
    11·2 answers
  • How do you access the <br><br>internet in your school and at home?​
    11·1 answer
  • Most case fans have standard _______________ connectors that are easy to plug in but can be forced to be connected the wrong way
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!