1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lidiya [134]
3 years ago
12

If your machine is not used as a server and is not on a local network, what packet-filtering strategy should you use?A. Block al

l ports except 80. B. Do not block any ports. C. Block all ports. D. Do not block well-known ports.
Computers and Technology
1 answer:
IceJOKER [234]3 years ago
3 0

Answer:

<em>Block all ports except 80</em>

Explanation:

We can make our network more defensive by blocking all ports except 80. This strategy can reduce the risk of attackers. If all the ports that are not in used are not in used can make system or network insecure. To enhance the security and reduce the risk of attacks we block all the ports that are not in used.

Using this strategy on people visit who need the data and attacker cannot access the system, without consent of owner.

You might be interested in
Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be u
Artemon [7]

Answer:

Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?

Explanation:

6 0
3 years ago
What are potential problems with using nanorobots ?
mash [69]
It can penetrate the blood-brain barrier.
5 0
3 years ago
Edhesive 9.10 Question 3
Ede4ka [16]

Answer:

your on unit 9 of edhesive?

Explanation:

5 0
3 years ago
Read 2 more answers
From which Menu option you can change page setup in MS Word​
marissa [1.9K]

page layout tab or the page setup dialog box

8 0
3 years ago
What is an information​ system? A. Information databases B. Information technology C. Hardware and software components D. Comput
Tom [10]

Answer:

Option E Components that interact to produce information

Explanation:

Information system is a system to collect, analyze and disseminate information. An information system consists of five components that work with each other to produce information:

  1. Computer hardware - physical machine that works with information
  2. Computer software - a set of computer instructions that tell computer hardware how to perform a task
  3. Telecommunications - components that connect a group of hardware as to establish a network. This usually includes WiFI technology.
  4. Databases and data warehouses - the place where the digital data are kept and retrieved.
  5. Human resources and procedures - human expertise that run the system by following some standard procedures.
5 0
3 years ago
Other questions:
  • You will write a program that reads a binary file that contains records of creatures. Each record can be stored in a Creature st
    10·1 answer
  • What's the ASCII code for boy ?
    15·1 answer
  • A program that interacts with another piece of software as it if were a human user is known as a(n) ________.
    5·1 answer
  • In your own words, describe what Internet Protocols are. Why is it important to have agreed upon protocols?
    6·1 answer
  • Throughout the course we have covered a lot of topics in relation to information systems. Select one or two of the major topics
    14·1 answer
  • Level of comfort that people feel
    10·1 answer
  • PLZ HELP! ANSWER (WITH CORRECT ANSWER AND EXPLANATION THAT ACTUALLY IS CORRECT) GETS BRAINLIEST!
    13·1 answer
  • What does a hanging indent look like?
    7·1 answer
  • How can the system administrator give the executive assistant the ability to view, edit, and transfer ownership of all records,
    6·1 answer
  • Creating a Numpy Array
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!