1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lidiya [134]
3 years ago
12

If your machine is not used as a server and is not on a local network, what packet-filtering strategy should you use?A. Block al

l ports except 80. B. Do not block any ports. C. Block all ports. D. Do not block well-known ports.
Computers and Technology
1 answer:
IceJOKER [234]3 years ago
3 0

Answer:

<em>Block all ports except 80</em>

Explanation:

We can make our network more defensive by blocking all ports except 80. This strategy can reduce the risk of attackers. If all the ports that are not in used are not in used can make system or network insecure. To enhance the security and reduce the risk of attacks we block all the ports that are not in used.

Using this strategy on people visit who need the data and attacker cannot access the system, without consent of owner.

You might be interested in
Gateway drugs are normally not addictive
scoundrel [369]
They are drugs that are <span>easy to get and ARE usually addictive</span>
5 0
3 years ago
Read 2 more answers
Why are the keys on the qwerty keyboard arranged the way they are?
sveticcg [70]
Sholes arranged the keys in their odd fashion to prevent jamming on mechanical typewriters by separating commonly used letter combinations.
7 0
2 years ago
Which type of data is most sensitive and should be protected from malware?
Dennis_Churaev [7]
The correct answer is “C. The credit card number that you use to make an online purchase”
5 0
1 year ago
Identify 3 ways mobile phone could be used to contact a bank apart from making a phone call to the bank
Zepler [3.9K]

Answer:

1. Email

2. Website

3. Customer service

8 0
3 years ago
"omr, ocr, and micr are all types of ________."
Juliette [100K]
OMR, OCR and MICR are all types of character and mark recognition devices. They are scanners <span>that are able to recognize special </span>characters and marks<span>.
</span>OMR stands for Optical Mark Recognition,which <span>senses the presence or absence of a mark.</span>
OCR stands for Optical Character recognition, which reads special preprinted characters by light source.<span>
MICR stands for Magnetic Ink Character Recognition, where  </span><span>machine reads character made of ink containing magnetized particles.
</span>
4 0
2 years ago
Read 2 more answers
Other questions:
  • In this program, you will create an object and display it. Create a class nerf Gun that includes data members model (string), ra
    5·1 answer
  • A girl scout troop with 10 girl scouts and 2 leaders goes on a hike. When the path narrows, they must walk in single file with a
    12·1 answer
  • What does a data bar in a cell represents​
    12·2 answers
  • Select the correct answer.
    6·1 answer
  • relational integrity constraints are rules that enforce basic and fundamental information-based constraints. True or False
    9·1 answer
  • Privacy Group of answer choices must be respected if we are to function as complete, self-governing agents is an absolute value
    5·1 answer
  • What are examples of templates the Input Mask Wizard offers? Check all that apply.
    12·2 answers
  • Write a program second.cpp that takes in a sequence of integers, and prints the second largest number and the second smallest nu
    7·1 answer
  • Lin wants to play an online game with her friends. She read the description of the game and knows it contains several features w
    12·1 answer
  • List of rules for expert systems​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!