Answer:
Your “digital footprint” includes all traces of your online activity, including your comments on news articles, posts on social media, and records of your online purchases. When you know the boundaries of your digital footprint and take steps to contain it, you can help protect your identity and your reputation.
Explanation:
Answer: 443
Explanation:
Port 443 will need to be enabled for secure transactions to go through because it is the default port for HTTPS which is the transfer protocol for secure communication.
This way your credit card transactions will be encrypted to ensure protection from those who would seek to steal your data and your money.
Answer:
The answer is "True".
Explanation:
The web beacons are one of the different techniques, that are used on web pages and emails, to check whether a user has access to some unobtrusively. It is a line, that is often invisible, and typically does not exceed 1 pixel.
- It is usually used with cookies.
- It is also known as a small graph, which generates a request to the server for tracking service.
Answer: (B) Allow the firewall to accept inbound traffic to ports 80, 110, 143, and 443
Explanation:
Port 80 is used by HTTP, 110 by pop3 to retrieve emails from web servers, 143 by imap for internet messaging and 443 is used for TCP for websites using SSL. So if the firewall is allowed to accept inbound traffic to these ports 80,110,143 and 443 then it would be possible to retrieve emails.
Answer:troubleshooting the network when there are problems with the connectivity ||||||| improving network speed
Explanation: