1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetlanka [38]
3 years ago
11

The system administrator at a small but high-profile company realizes that they need to secure the company’s email. Which email

protocols does the system administrator secure with Secure Sockets Layer/Transport Layer Security (SSL/TLS) that also use Transmission Control Protocol (TCP) ports 993 and 995, once secured?
Computers and Technology
1 answer:
aliina [53]3 years ago
4 0

Answer:

IMAP and POP

Explanation:

The internet message access protocol (IMAP) is an internet protocol used for email retrieval through the port number 993 over the TCP protocol, from the mailing server. It server listens on port number 143 and the protocol allows for emails to be store permanently by the choice of the user.

The POP or post office protocol is sometimes used with the IMAP in the email system configuration. It is used to send email to a mail box through TCP port number 995. It's server listen to the request channel at port 110. It allows for a copy of the email to be downloaded by the client, with the original still in the server.

You might be interested in
What technology habit you practice every day that you need to stop to be more successful?
Juliette [100K]

Playing on the Devices all day (ex: PS4, PC, Xbox, Phone, ipad) and focusing on other things that might help me in the future. I'm not saying stop playing but an hour a day is enough.

4 0
4 years ago
Order the steps for accessing the junk email options in outlook 2016
Zinaida [17]

Answer:

What is the question here? lol

Explanation:

8 0
4 years ago
What are 3 important reasons to reconcile bank and credit card accounts at set dates?
Karo-lina-s [1.5K]

Answer:

To verify transactions have the correct date assigned to them.

To verify that an account balance is within its credit limit.

To verify that all transactions have been recorded for the period.

Explanation:

7 0
3 years ago
An outdoor products company wants to test a new website design where customers can get information about their favorite outdoor
ExtremeBDS [4]

Answer:

Option (A) is the right answer for factors.

Option (B) is the right answer for factor levels.

Explanation:

As per the scenario, the company wants to see the effect of their new website design on their customers, for which the factor of time spent on the new website is right because it gives the company to acknowledge the data of time spent by a customer on the new website.

To reach the result of the factor, we have to work on the factor level, in which we will compare the time spent on the old website and the new website because it gives the company an idea of customers preferring which website design.

8 0
3 years ago
How to disappear completely from the internet pc magazine
GREYUIT [131]

In order to disappear completely from the internet, one needs to delete their social media accounts, delete their emails, etc.

The internet is a network of interconnected computer systems. Despite its numerous advantages, it also has several disadvantages and there are some moments when we want to disappear from the internet.

The steps that are needed to disappear from the internet include:

  • Delete your social network accounts.
  • Delete your email accounts.
  • Use search engines to track your old activities online and delete them.
  • Falsify the accounts that can't be deleted.
  • Unsubscribe from mailing lists.

Read related link on:

brainly.com/question/24902823

4 0
3 years ago
Other questions:
  • Why did the Wright brothers construct their own wind tunnel?
    11·1 answer
  • Tony is interviewing with the hiring manager for an IT job.
    11·1 answer
  • A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, p
    5·1 answer
  • What things have small motors
    13·1 answer
  • The amount of ram that is actually on the memory modules in your computer is the ________ memory.
    11·1 answer
  • an IPv6 packet has a 40 byte base header, a 20 byte destination options extension header (which is not used for routing) and 200
    5·1 answer
  • An example of a ______ in the United States are computer hackers, whose members engage in actions that subvert authority, disrup
    6·1 answer
  • Which memory can be removed from motherboard? RAM OR ROM?​
    7·1 answer
  • Consider the following method.
    14·1 answer
  • Intelligent transportation systems use GPS to<br> Select all that apply.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!