1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ElenaW [278]
3 years ago
5

An administrator needs to examine ftp commands being passed to a server. what port should the administrator be monitoring?

Computers and Technology
1 answer:
Hitman42 [59]3 years ago
7 0
Port 21

The server-PI (Server Interpreter) is the process that listens to port 21 on the FTP server. The Server Interpreter has control over server-DTP (Server Data Transfer Process), the method used for data transfer connection. The server-PI must be in a position to respond to standard FTP commands like USER and PASS and several other commands.

 

 



You might be interested in
____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small,
LiRa [457]

Answer:

d.) Service-Oriented Architecture

Explanation:

Because its definition matches

4 0
3 years ago
Within the sites that support disaster recovery, __________ is a separate facility that does not have any computer equipment but
inna [77]

Question:

Within the sites that support disaster recovery, __________ is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

A) disaster site

B) hot site

C) warm site

D) cold site

Answer:

The correct answer is answer is D)                  

Explanation:

A cold site is a business location that is utilised as a  backup in the event of a disruptive operational disaster at the normal business site. A cold site is an office, but it does not always have the necessary equipment to resume prompt operations. The business paying for the cold site, provides and installs this equipment.

Cheers!

6 0
3 years ago
Graded Assignments may be found at the end of each chapter of the required textbook under the title "Real-World Exercises". Each
mina [271]
Ok chapter 2 be done by 11:59
5 0
3 years ago
According to Android’s suggested user interface standards, repeatedly pressing the app icon on an app’s action bar will eventual
marusya05 [52]

Answer:

False

Explanation:

No app icon on app's action bar will move the device  to its home screen.It is not a valid statement.

8 0
3 years ago
Read 2 more answers
You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicle
kati45 [8]

There are different ways to ensure safety of devices. The best protection to implement to address your concerns is to use cable locks to chain the laptops to the desks.

  • The use of laptop locks is as good as when compared to bicycle chain locks. One can do this by looking for a big, immovable object, such as one's desk, and thereafter you wrap the metal cable around it and then insert the lock into your laptop's lock slot.

With this, your computer becomes theft-proof.

Thia will give you piece of mind as you will not be restless anymore.

Learn more about Laptop security from

brainly.com/question/24956493

3 0
2 years ago
Other questions:
  • Difference between multiterm access and single term access for webassign
    11·1 answer
  • In which type of attack do you get malicious code in links from seemingly reliable websites?
    14·1 answer
  • You have a multi-domain Windows Server 2008 forest. You need to make a shared folder available to users from several domains. Wh
    9·1 answer
  • Which systems provide a single, cohesive platform
    11·1 answer
  • What are scientists going to explore next on Kepler-186f? A) evidence of the existence of life B) types of plant life that exist
    8·2 answers
  • Use the drop-down menus to complete the statements about message marking, categorizing, and flagging.
    13·2 answers
  • Open excel program then use the (IF) function to fill the column of (Expensive/Cheap) then save your
    9·1 answer
  • When the CPU performs the work described in the commands,
    11·1 answer
  • Data mining requires specialized data analysts to ask ad hoc questions and obtain answers quickly from the system. select one: t
    12·1 answer
  • In C++ please (read the image below for instructions)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!