1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pentagon [3]
4 years ago
14

Port 88 used in Kerbrose. State True or False. Select one: True False

Computers and Technology
1 answer:
jasenka [17]4 years ago
5 0

Answer: True

Explanation:

Yes, the given statement is true that by default kerberos used the UDP (user data-gram protocol) port 88.

Keberos is the UDP protocol and the kerberos client basically send the UDP and the transmission control protocol (TCP) packets to the port 88 and then it receive the response from kerberos server.  

It basically use special configuration on the firewall which basically allow the UDP request from the sever of kerberos.

You might be interested in
Software obtained illegally is called open-source software. true / false
Oxana [17]
False, software obtained illegally is called Pirated Software.
<span>Open source software is software developed by and for the user community, ie. Linux based software is Open Source.</span>
3 0
3 years ago
A good way to assess your CPU usage is to:_______.
inna [77]
C is likely the best answer here.
8 0
3 years ago
What were the important developments that occurred in photography that facilitated the creation of motion pictures? Two critical
8_murik_8 [283]

Answer:

"A moving picture is an illusion that makes a still photo seem to move. The basic principal behind motion pictures is the fast transition between one picture to the next, almost creating a seamless transition. A flip-book is a good example of this. Another example would be film used for old movies. The film contains negatives of an image which when light is shined through creates a "shadow" of the image. If you quickly transition the film from one image to the next you end up a motion picture."

Explanation:

7 0
3 years ago
Legal counsel has notified the information security manager of a legal matter that will require the preservation of electronic r
Ray Of Light [21]

Answer: (B) Legal hold

Explanation:

As being a security director, the security director are approached to solidify a server that run the red hat enterprise server the 5.5.

The servers are being utilized as DNS (Dynamic host service) and the server time. This is not utilized as the database, print server and the web server. There is no particular remote associations with the server.

The window of the command will be given the root accessing. Then, it provide the associated by means of a protected shell with the access root in the system.

 

3 0
3 years ago
With the sheets grouped, apply Underline to cell B5 and Double Underline to cell B6. Ungroup the worksheets. Note, use the Forma
Orlov [11]

Answer:

Check Explanation.

Explanation:

Task: (1). Apply Underline to cell B5 and Double Underline to cell B6.

(2). Ungroup the worksheets.

(3).use the Format Cells dialog box to ensure that the Underline styles Single and Double are applied, rather than Single Accounting or Double Accounting.

Steps to follow;

Step one: On the Excel document that you are working on, make sure you highlight from B6 cell to F6 cell.

Step two: Then, press CTRL+SHIFT+F.

Step three: from action in step two above, the "format cells dailogue box" will come up, click underline > (underline type) dropdown list > ok.

Step four: next, highlight from B7 to F7.

Step five: press CTRL+SHIFT+F. As in step two above.

Step Six: do the same thing as in Step three above.

Please note that to apply the SINGLE UNDERLINE, you need to type the data in the cell for cells of B6 to F6 ONLY.

Also, for DOUBLE UNDERLINE for B7 to F7; just type the data in the cell and it will apply.

4 0
3 years ago
Other questions:
  • You’ve received a tarball called data79.tar from a colleague, but you want to check the names of the files it contains before ex
    15·1 answer
  • Select the most likely outcome of making only on-time minimum payments to a credit card with a balance for an entire year?
    7·2 answers
  • Who invented the ENIAC? More than one answer may apply.
    14·1 answer
  • Prepare a risk assessment report (RAR) with information on the threats, vulnerabilities, likelihood of exploitation of security
    14·1 answer
  • 2.36 LAB: Warm up: Variables, input, and casting (1) Prompt the user to input an integer, a double, a character, and a string, s
    12·1 answer
  • What time is spellrd the same forwards and backwards​
    11·1 answer
  • State True or False: 1. Application software can run without the presence of system software. 2. . A language processor translat
    14·1 answer
  • I’ll give brainliest if answers are correct
    11·1 answer
  • ________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Hum
    9·1 answer
  • The tools, skills, knowledge, and machines created and used by humans is known as.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!