1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lidiya [134]
3 years ago
12

If your machine is not used as a server and is not on a local network, what packet-filtering strategy should you use?A. Block al

l ports except 80. B. Do not block any ports. C. Block all ports. D. Do not block well-known ports.
Computers and Technology
1 answer:
IceJOKER [234]3 years ago
3 0

Answer:

<em>Block all ports except 80</em>

Explanation:

We can make our network more defensive by blocking all ports except 80. This strategy can reduce the risk of attackers. If all the ports that are not in used are not in used can make system or network insecure. To enhance the security and reduce the risk of attacks we block all the ports that are not in used.

Using this strategy on people visit who need the data and attacker cannot access the system, without consent of owner.

You might be interested in
______A computer program may only be constructed in a high level language. (T/F)
NeTakaya

Answer:

False.

Explanation:

A computer program can not only constructed in a high level language but also in low level language such as assembly language used for microprocessor for ex-8085 microprocessor,8086 microprocessor ,ARM assembly language and there are many more.

High level languages are programmer friendly they are easily understood by the programmers because they uses english words while low level languages are difficult because they uses binary language 0's or 1's.

Hence the answer to this question is False.

5 0
4 years ago
Which wireless standard can stream data at a rate of up to 54 mbps using a frequency of 5 ghz?.
sleet_krkn [62]

Answer:

802.11a

Explanation:

4 0
3 years ago
Pleas help I will give brainiest
stellarik [79]
1) A
2)D
3)C
4)A
5)D
Hope this will help u
5 0
3 years ago
Read 2 more answers
You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not su
Semenov [28]

Answer:

b) TKIP encryption,e) Preshared key

Explanation:

The parameters that need to be configured on the laptop include the Temporal Key Integrity Protocol (TKIP) and the Preshared key. TKIP is an older wireless protocol that encrypts data at bit level. It is less secure as compared to the Advanced Encryption Standard (AES), AES works well with WPA2 which is not supported by the access point. The preshared key is the access password used on a shared secure channel. It is also used to validate users on the WiFi network. Once the two parameters are configured the laptop will have access to the network

3 0
3 years ago
What is the most popular gaming computer brand rn, 2022
tankabanditka [31]

Answer:

hp/omen  or  SONY

Explanation:

because hp has been making a lot better computers, and possibly SONY because the ps5 release that came out a couple years ago.

4 0
2 years ago
Read 2 more answers
Other questions:
  • Can someone show me a image of this completed I will mark brainliest!!! It's typing.com
    11·1 answer
  • Several steps are involved in creating a presentation. what is the last step in the process before preparing to presenting it?
    12·1 answer
  • I'm new to programming and I'm starting with c++, so the first program I want to write should take a string of characters and ou
    8·2 answers
  • The _______ is a small program run by a computer when first powered on. its primary function is to stabilize the machine and dev
    11·1 answer
  • ___ is the technology used by smart phones to send text messages.
    6·1 answer
  • Write a program to accept two numbers<br>in two lines and find Square root of Squares<br>of thion​
    13·1 answer
  • The action displayed in the status bar while pointing-
    7·1 answer
  • Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
    12·1 answer
  • 1 _ A Unit of information containing the object's position: rotation, and scale values is called:
    10·1 answer
  • A user logs in to a virtual world and creates an animated character representing themselves, which they then use to move through
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!