1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lidiya [134]
3 years ago
12

If your machine is not used as a server and is not on a local network, what packet-filtering strategy should you use?A. Block al

l ports except 80. B. Do not block any ports. C. Block all ports. D. Do not block well-known ports.
Computers and Technology
1 answer:
IceJOKER [234]3 years ago
3 0

Answer:

<em>Block all ports except 80</em>

Explanation:

We can make our network more defensive by blocking all ports except 80. This strategy can reduce the risk of attackers. If all the ports that are not in used are not in used can make system or network insecure. To enhance the security and reduce the risk of attacks we block all the ports that are not in used.

Using this strategy on people visit who need the data and attacker cannot access the system, without consent of owner.

You might be interested in
Which site had a major influence on the social gaming site Friendster?
Oduvanchick [21]
The answer is, "Ryze".
4 0
3 years ago
Read 2 more answers
Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f
kumpel [21]

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

8 0
3 years ago
Which of these converts analog audio signals into digital codes in a computer?
DaniilM [7]
It would either be A. Audio card or D. Sound card but most likely A
6 0
2 years ago
Read 2 more answers
What is the name of this tool and what can it be used for?<br> Thanks!!
Iteru [2.4K]
That is a corqet tool it is used for fixing tires
6 0
3 years ago
You want to send an email message to your friend to describe your meeting with Michal. However, you incorrectly type the name as
Gemiola [76]

Answer:

Option B.

Explanation:

The delete key is used to delete the symbol after the insertion point.

Here, Michal is typed as Michael.

So, to delete the letter e from Michael, put the insertion point before e.

If you put insertion point after the letter e or before the letter l, l gets deleted.

In no case, you can put the insertion point after the letter l.

So, option B is correct.

4 0
3 years ago
Other questions:
  • Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa
    5·1 answer
  • Which of the following best describes the 7x7 PowerPoint rule
    8·1 answer
  • PLEASE HELP
    15·2 answers
  • Meats ages hair and feathers all contain this monomer
    13·1 answer
  • 6.What does transgenic mean?​
    12·2 answers
  • Does nest cam outdoor connect to a security camera prewire
    15·1 answer
  • Another term for the plot structure of the hero journey
    13·1 answer
  • when I turn on my pc using a graphics card, it does give video, and everything is normal, but when I try to turn on my pc with t
    8·1 answer
  • _____ oversee the work of various types of computer professionals and must be able to communicate with people in technical and n
    5·1 answer
  • When you save something to the Desktop on a school computer, what drive letter will it save to
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!