1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ElenaW [278]
3 years ago
5

An administrator needs to examine ftp commands being passed to a server. what port should the administrator be monitoring?

Computers and Technology
1 answer:
Hitman42 [59]3 years ago
7 0
Port 21

The server-PI (Server Interpreter) is the process that listens to port 21 on the FTP server. The Server Interpreter has control over server-DTP (Server Data Transfer Process), the method used for data transfer connection. The server-PI must be in a position to respond to standard FTP commands like USER and PASS and several other commands.

 

 



You might be interested in
Select the correct answer,
bazaltina [42]

Answer:

b gyhffhhhgghhhhhhhhhhh

3 0
4 years ago
Imagine a situation where two developers are simultaneously modifying three different software components. what difficulties mig
lbvjy [14]
A main problem that may arise is if they have created two different ways of adressing the same part of the software
4 0
3 years ago
Anti-malware software should be installed on computer systems to detect and prevent malware infections.
Evgen [1.6K]

Answer:

true

Explanation:

Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. A wide variety of types of malware exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, and scareware

Antimalware (anti-malware) is a type of software program designed to prevent, detect and remove malicious software (malware) on IT systems, as well as individual computing devices

6 0
3 years ago
Read 2 more answers
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
EdHesive 3.7 Code Practice?
devlian [24]

Answer:

if 3 + 3 == 6:

 print("Hey 3 and 3 is 6")

 if 5 + 3 == 8:

   print("You are not going to catch me")

   if 5 + 6 == 10:

     print("****nag*****")

   else:

     print("You thought like 5 + 6 = 11 ")  

     if 6 + 6 == 12:

       print("Great! This one is correct")

       if 5 + 7 == 12:

         print("Great, this is correct as well")

         if 3 + 3 == 4 and 5 + 5 == 10:

           print("Great! Congrats")

Explanation:

Please check the answer, and practice if else and various other ladders as much as you can.

8 0
4 years ago
Other questions:
  • Maia notices that her paragraphs are too close to one another. She wants to increase the space. Which arrangement of steps does
    6·2 answers
  • Students at a university are working on a project. the project involves many computing systems working together on disjointed ta
    9·2 answers
  • A 1400 kilogram car is moving at a speed of 25 m/s. How much kinetic energy does the car have?
    15·2 answers
  • Sharon is responsible for the security on web applications. She’s looking to see if all applications have input validation. What
    12·1 answer
  • People without digital literacy skills are often the victims of
    12·1 answer
  • What is the manufacturer’s specific ID for Intel Core?
    7·1 answer
  • Each new term in the Fibonacci sequence is generated by adding the previous two terms. By starting with 1 and 2, the first 10 te
    13·1 answer
  • personal digital assistants are handheld devices that serve as personql information managers. what is another term used to refer
    11·2 answers
  • The metric unit used for length
    5·1 answer
  • Name the default Package of java<br>​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!