1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ElenaW [278]
3 years ago
5

An administrator needs to examine ftp commands being passed to a server. what port should the administrator be monitoring?

Computers and Technology
1 answer:
Hitman42 [59]3 years ago
7 0
Port 21

The server-PI (Server Interpreter) is the process that listens to port 21 on the FTP server. The Server Interpreter has control over server-DTP (Server Data Transfer Process), the method used for data transfer connection. The server-PI must be in a position to respond to standard FTP commands like USER and PASS and several other commands.

 

 



You might be interested in
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
Vilka [71]

There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.

Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.

They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software  

Learn more from

brainly.com/question/14728460

5 0
2 years ago
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while
VashaNatasha [74]
  • You can get a antivirus subscription that will kill malwares
  • Also, you can avoid going on websites you don't trust
  • I hope this helps you.
4 0
2 years ago
Where is permanent data in the computer stored? Whenever Jim starts his laptop, he sees some commands and numbers appearing on h
Wittaler [7]

the operating system ithink

4 0
3 years ago
A virus that propagates using the internet or another computer network is called __________.
olasank [31]
This is called a worm
8 0
3 years ago
How does Python recognize a tuple?
Talja [164]

Answer:

B) You use parentheses around the data values

Explanation:

It was C) on my end, but the answer is still the same :)

7 0
3 years ago
Read 2 more answers
Other questions:
  • witch of the following is a good way to choose your location as you develop your study method? A. Going where most of your frien
    6·1 answer
  • These are questions from my Computer/Customer Support Class
    6·1 answer
  • Windows explorer has a pane located on the left side which can display the directory structure of one or more drives. what is th
    15·1 answer
  • What is VoIP?
    5·1 answer
  • A) Write a class Card. A Card has the following private attributes:
    5·1 answer
  • Write a method named circleArea that accepts the radius of a circle as a parameter (as a real number) and returns the area of a
    12·1 answer
  • Jason is working on a project that requires him to manage a huge amount of data. The spreadsheet he is working on has data relat
    15·1 answer
  • What is the definition of posture<br>​
    7·1 answer
  • How to turn off windows 10 without loosing sound?
    11·1 answer
  • Dynamic programming does not work if the subproblems: ___________
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!