1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
My name is Ann [436]
3 years ago
5

"Matthew captures traffic on his network and notices connections using ports 20, 22, 23, and 80. Which port normally hosts a pro

tocol that uses secure, ncrypted connection
A. 20
B. 22
C. 23
D. 80 "
Computers and Technology
1 answer:
avanturin [10]3 years ago
6 0

Answer:

B.22

Explanation:

I know this because 22 is normally a port that hosts a protocol with an encrypted connection

You might be interested in
All the network nodes are connected to each other
Shalnov [3]
It’s a mesh topology
7 0
3 years ago
Many people object to increased cybersecurity because _____.
yawa3891 [41]
Depending on what kind of security measures are implemented, D would definitely be a contender. However, B is also something to take into consideration. I would answer D.<span />
5 0
4 years ago
Read 2 more answers
How to beat level 50 in give up robot 2
LiRa [457]

Answer:

just follow the steps and and become tough calm but tough

3 0
3 years ago
The bus width and bus speed together determine the bus's ____ or bandwidth; that is, the amount of data that can be transferred
stealth61 [152]
Another name for amount of data transferred in a given amount of time is "throughput".
5 0
4 years ago
Assume x represents an integer number, what is the highest index value in the following array? byte[] values = new byte[x]; Grou
scoundrel [369]

Answer:

You forgot to add a group of choices, however assuming this programming language uses 0-based indexes the answer would be x - 1

Explanation:

Zero based index languages have array indexes starting at 0. When you create that array, you use x to define the amount of elements, however due to the array starting at the index 0, the arrays highest index would be x - 1 instead of x.

4 0
2 years ago
Other questions:
  • You picked the corridor which led you here. If the guards find you, they're going to be really ANGRY! What is the synonym of ANG
    5·2 answers
  • Describe the importance of prioritizing your focus when designing for multiple purpose
    9·1 answer
  • A restaurant has a case type that allows customer to book the dining room for events. Customers provide basic information includ
    7·1 answer
  • You are working on a router that has established privilege levels that restrict access to certain functions. you discover that y
    5·1 answer
  • central, secure database in which Windows stores hardware and software configuration information and system security policies is
    12·1 answer
  • Haigy Paigy is as a children's invented language which sounds exactly like English, except that "aig" is inserted before the vow
    12·1 answer
  • ______ controls are information security safeguards that focus on the application of modern technologies, systems, and processes
    12·1 answer
  • Which of the following responses is the best example of a problem that can be solved using a computer program?
    6·2 answers
  • When you first purchase a notebook, make sure you have a ____ CD containing the installed OS so you can recover from a failed ha
    5·1 answer
  • Once you select a theme, you__________ change the theme’s individual elements independently of each other.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!