1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alina [70]
2 years ago
5

Your company just installed a new web server within your DMZ. You have been asked to open up the port for secure web browsing on

the firewall. Which port should you set as open to allow users to access this new server?
Computers and Technology
1 answer:
alexdok [17]2 years ago
5 0

Answer:

The port that should be set open to allow users to access this new server is:

TCP port.

Explanation:

Ports are openings or entrance doors through which data packages have access to a PC or server.  TCP and UDP are transport protocols with port numbers.  TCP means Transmission Control Protocol.  They are used to connect two devices over the internet and other networks.  UDP means User Datagram Protocol.  They are used to connect applications and to speed the transfer of data.  Comparatively, UDP is faster, simpler, and more efficient than TCP.  TCP enables retransmission of lost data packets, which UDP cannot do.

You might be interested in
Create an Entity-Relationship Diagram with the following requirements.
melamori03 [73]

Answer:

idk

Explanation:

6 0
3 years ago
The steps for creating a newsletter are to ____.
leonid [27]

Answer:

C) Plan, write, format, and proofread

Explanation:

You need a plan for any professional newspaper. Proofreading is also a vital step in the process. You can only format what you've already written, so it has to be C.

4 0
3 years ago
What type of software is an antivirus?
Kamila [148]

Answer: what type of software is an antivirus?

Answer: A security software

Explanation:

Antivirus software is a type of security software designed to protect users from multiple types of malware, not just viruses. The software is a risk management tool that scans devices regularly and on-demand for known malware and suspicious behavior associated with malware.

6 0
2 years ago
Read 2 more answers
Some commands listed in a menu cannot be selected.<br><br><br> True or False
bogdanovich [222]
True! Have a nice week
4 0
3 years ago
Read 2 more answers
Utilizando o padrão de medidas e unidades do National Institute of Standards and Technology, em que 1 KB é igual a 1.000 Bytes,
Tanya [424]

Segundo o padrão da  National Institute of Standards and Technology a  alternativa correta é a letra E) 400 músicas.  Segundo o padrão disposto acima, dois Giga Bytes equivalem à dois mil Mega Bytes, assim, se cada música tem exatos 5MB, podemos chegar ao total de músicas que podem ser gravadas em um PenDrive de 2GB livres do seguinte modo :

x=\frac{2000 MB}{5MB};x=400

 A evolução da microeletrônica possibilitou uma capacidade de armazenamento cada vez maior a cada ano. O desenvolvimento de novas tecnologias na área permite também que os produtores possam produzir músicas, fotos e vídeos com cada vez mais qualidade (consequentemente mais pesada).

5 0
2 years ago
Other questions:
  • When you include a word cover page in a multi page document, the cover page is not considered the first page. True or false?
    13·1 answer
  • Criminal Investigation people called my house on an automated voice is this a scam ??
    13·1 answer
  • Binary is best interpreted by a computer because?
    8·2 answers
  • If 15 bits are sent in 3 seconds then Bits intervalis__________
    13·1 answer
  • Object-oriented programs employ a group of techniques for handling errors called ________ handling.
    12·1 answer
  • How do you get a crown on this website<br> look under your points on the right side of your picture
    15·2 answers
  • How did the internet originate??​
    12·1 answer
  • Which of the following statement is correct? Select one: a. Base register holds the size of a process. b. Limit register holds t
    10·1 answer
  • Determine which system you would recommend each of the customers use based on their provided user and system specs.
    11·1 answer
  • When conducting memory and recall tests, some people make an effort to normalize memories by not reporting extreme cases. this l
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!