1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
m_a_m_a [10]
3 years ago
6

Why would a network administrator want to filter certain ports when capturing data such as FTP traffic

Computers and Technology
1 answer:
hjlf3 years ago
5 0

Answer:

To avoid receiving malware-infected files like spam.

Explanation:

Hackers use malware to gain unauthorized access to company files and information for personal gain. Files infected by the malware can infect other systems or files. There are various types of malware namely; virus, trojan horse, worm, spyware, ransomware, adware etc.

You might be interested in
The two fundamental approaches to moving data through a network of links and switches are
olga55 [171]

Answer:Packet and circuit switching

Explanation: Packet switching is the technique through which the data is sent from the source to destination in the form of data packets on dynamic path.It is the time of connectionless switching and route generates for each packet.

Circuit switching is the switching technique having connected path for the sending and receiving of the data.They have well defined and established path for the transmission of data.

Other options are incorrect because they define the terms that are associated with the data that gets transmitted like bandwidth,transmission rate ,packet etc. These options are not the way in which data transmitted or switched.Thus, the correct option is packet and circuit switching.

6 0
3 years ago
How do i voice record on my (acual ipod itself) ipod nano 4th generation helppppppp
Olenka [21]

Answer: it is called voice memo search it on your settings

Explanation:

3 0
3 years ago
You need to apply security settings to the registry on a Windows server. Which command should you use
Mekhanik [1.2K]

There are different kinds of measures taken in security. The command should you use is   Certutil.

<h3>What is Certutil</h3>

Lawrence Abrams was known to be the man that mad Windows to have a built-in program called CertUtil.

This is often used to manage certificates in Windows where one can install, backup, delete, manage, and perform a lot of functions related to certificates and certificate that are saved in Windows.

See full question below

You need to apply security settings to the registry on a Windows server. Which command should you use?

certutil

regedit

regex

cipher

Learn more about Certutil from

brainly.com/question/24931496

7 0
2 years ago
Define slide and slide show​
sleet_krkn [62]

Answer:

A slide is a single page of a presentation. A slide show is an exposition of a series of slides or images in an electronic device or in a projection screen.

Explanation:

hope this helps :D pls mark brainliest :D

7 0
3 years ago
Read 2 more answers
Which search engine does not track users? Choose the answer.
zhuklara [117]

Answer:

I think the answer is Bing,am familiar with others

8 0
4 years ago
Read 2 more answers
Other questions:
  • In object-oriented analysis, objects possess characteristics called _____.â
    14·1 answer
  • You can decide if a paint booth filter is hazardous waste by answering which of the following questions: A) Is the paint residue
    12·2 answers
  • The picture that graphically represents the items you use in Windows is called a/an
    15·1 answer
  • In 1–2 sentences describe how you would insert a row in a spreadsheet.
    11·1 answer
  • How do assembly language different from machine language?
    15·1 answer
  • One student will be stationed near you in a coffee shop. The other student will be located two miles away from your school. You
    10·2 answers
  • What network problems can be solved on your<br> end?
    13·2 answers
  • When first designing an app, all of the folldwing are important EXCEPT
    13·1 answer
  • How to install an older version of prettier on yarn
    9·1 answer
  • Apart from using secure networks, how else can Dhruv keep his deliverables safe in the office and on the go? Select all that app
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!