1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kifflom [539]
3 years ago
14

3. Matthew captures traffic on his network and notices connections using ports 20, 22, 23, and 80. Which port normally hosts a p

rotocol that uses secure, encrypted connections?
Computers and Technology
1 answer:
Otrada [13]3 years ago
4 0

Answer:

Port 22

Explanation:

The Secure Sockets Layer (SSL) is a session-connection layer protocol that is responsible for data authentication and encryption for internet connections

The default SSH port for is Port 22..

The port 22 is used by SSH to activate encryption of data that is communicated via a public network connection( the public network connection could be a global network, a local network, the internet or internet access, ), hence, VPN functionality is provided.

You might be interested in
There is an increasing need for private security personnel because of declining resources for many government agencies and a sho
aivan3 [116]
<span>True
</span><span>There is an increasing need for private security personnel because of declining resources for many government agencies and a shortage of police officers in many communities due to lack of funding.

</span>
8 0
4 years ago
Which of these AWS resources cannot be monitored using VPC Flow logs?a) V​PCb) A​ subnet in a VPCc) A network interface atta
WINSTONCH [101]

Answer:

d) An Internet Gateway attached to VPC.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Amazon Web Services (AWS) is an example of a cloud computing platform that offer its users a global cloud-based products and services such as storage, security, computing resources, database, analytics and management tools etc.

Some of the Amazon Web Services (AWS) resources that can be monitored using virtual private cloud (VPC) Flow logs includes;

I. A VPC

II. A subnet in a VPC

III. A network interface attached to EC2

However, an Internet Gateway attached to VPC is an AWS resource that cannot be monitored using virtual private cloud (VPC) Flow logs.

7 0
3 years ago
In what year was the first world-wide web software created by tim berners-lee?
Elena L [17]
1989 <span>A graduate of Oxford University, Tim Berners-Lee invented the Web while at CERN, the European Particle Physics Laboratory, in </span>1989<span>. He wrote the first web client and server in </span>1990<span>.</span>
6 0
3 years ago
Online activities among businesses
Masja [62]

Some of the online activities among businesses are:

  • SEO consultant. ...
  • Web designer or web developer. ...
  • Blogger. ...
  • Virtual assistant. ...
  • Affiliate marketer, etc

<h3>What are Online Activities?</h3>

This refers to the various activities that are done on the world wide web and is usually used by businesses to increase visibility, and in turn, revenue.

Hence, we can see that the use of online activities by businesses are important because the products and services for sale by businesses are advertised to target audiences through some of the aforementioned activities.

Read more about online activities among businesses here:

brainly.com/question/27172895

#SPJ1

3 0
2 years ago
a department chair decides to change a little-used computer lab into a lounge so that students will interact more between classe
tekilochka [14]

Option D discursive and planned is the correct option.

Which of the following best describes the organizational hierarchy system of communication?

It is a multi-tiered structure of reporting levels and system checks provided for a regular flow of information between managers and employees.

What is the meaning of discursive writing?

Well, a discursive essay is a genre of writing that asks you to investigate a topic; gather, read and evaluate evidence; and present a position on your topic based on the evidence gathered.

What is an example of planned change?

The introduction of employee welfare measures, changes in the incentive system, introduction of new products and technologies, organizational restructuring, team building, enhancing employee communication, as well as technical expertise, fall under the category of Planned Change.

What are the three types of change give examples.

Ackerman (1997) has distinguished between three types of change:

Developmental – May be either planned or emergent; it is first order, or incremental. ...

Transitional – Seeks to achieve a known desired state that is different from the existing one. ...

Transformational – Is radical or second-order in nature.

Thus , option D is the correct option:

To know more about planned changes:

brainly.com/question/25594630

#SPJ4

3 0
1 year ago
Other questions:
  • What executable programs have names that are just one character long, and what do they do??
    5·1 answer
  • Suppose arraylist list1 is [1, 2, 5] and arraylist list2 is [2, 3, 6]. after list1.addall(list2), list1 is __________.
    8·1 answer
  • Nearly all states allow citizens who are not able to go to the polls due to business travel to vote using this method: Internet
    9·2 answers
  • If we develop a new policy for our environment that requires us to use complex and automatically generated passwords that are un
    11·1 answer
  • With which game is the Taito Corporation associated?
    9·1 answer
  • Write a program that reads in characters from standard input and outputs the number of times it sees an 'a' followed by the lett
    11·1 answer
  • Which of the following will increase the level of security for personal and confidential information on a mobile device if the d
    14·1 answer
  • Does anyone know how to unblock websites on a school chromebook?
    6·2 answers
  • What are a few ways to format the text in a mail message in Outlook? Check all that apply.
    7·2 answers
  • I have a .NET 6 basic website that I built using Entity Framework as the database for updating pages. I am ready to deploy the s
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!