1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TEA [102]
3 years ago
10

What security trade-offs or options should an administrator consider when confronted with a potentially extraneous service, such

as FTP or SMTP, running on a web server? *
Computers and Technology
1 answer:
Wewaii [24]3 years ago
8 0

FTP or File Transfer Protocol was never designed to be hack-safe. Files exchanged using FTP are not encrypted. Hence, this service is susceptible to various kinds of security risks such as spoofing, sniffing, etc.

<h3>What tradeoff must the Administrator consider when using FTP?</h3>

Although the FTP is insecure, it is a very fast way of transferring files.

When the connection is lost during file transfer, it is possible to resume such a transfer.

It also allows for queuing, scheduling, uploading, and downloading of files.

The full meaning of SMTP is Simple Email Transfer Protocol.

Learn more about FTP and SMTP at:

brainly.com/question/17506968

brainly.com/question/14396938

You might be interested in
Which subexpression will be solved first in the given statement?
Crazy boy [7]

Answer:

If you dont buy terraria than im going to make mrbeast buy it for you

Explanation:

reeeeeeeeeeeeeeeeeeeee

4 0
4 years ago
int myArray-11,3,-8,30,-2,0,5,7,-100,44); Write a loop statement to display the positive numbers each on a separate line like th
dexar [7]

Answer:

#include <iostream>

using namespace std;

int main()

{

 int myArray[] = {-11,3,-8,30,-2,0,5,7,-100,44};

 int n = sizeof(myArray)/sizeof(myArray[0]);

 for(int i=0;i<n;i++){

     if(myArray[i]>=0){

         cout<<myArray[i]<<endl;

     }

 }

  return 0;

}

Explanation:

First include the library iostream in c++ programming for using the input/output function.

Then, create the main function and define the array with the elements which contain both positive element as well negative elements.

after, use the for loop for traversing the array and inside the loop take the conditional statement for check if element in the array is positive.. if it true then print the element on the screen with separate line.

4 0
3 years ago
What is the output of this line of code
LenKa [72]

Answer:

D - hellogoodbye

Explanation:

since your merging two string together you will simply just get one string in total

5 0
3 years ago
Read 2 more answers
Which presentation software element can you use to control the speed between slides in a presentation?
Ad libitum [116K]

The answer is the Transition element.

A slide transition in PowerPoint occurs when you move from one slide to another during a presentation. You can control the speed (time spend on a single slide before advancing to the next). We use set duration to set the transition speed. To set the transition speed to a shorter or a larger duration, select the slide and click on the Transitions tab in the Timing group. In the Duration box, type the number of seconds that you want.  


3 0
3 years ago
Read 2 more answers
Jennine has a table that she has created in Word. She has removed all borders inside the table, but now she wants a box around t
Crazy boy [7]

Answer:

The steps to create table, hide boarder and show border around the whole table is given below.

Explanation:

<u>1. Create Table</u>

  1. Click on insert Tab
  2. In insert tab, Click on Table
  3. Select No. of row and columns to create the table

<u>2. Hiding Boarders</u>

  1. Click on Design Tab
  2. In table style section Choose the layout that have no boarder

<u>3. Add boarder Around table</u>

  1. Click on Design Tab
  2. Select whole table by clicking on Plus sign on the top right corner of table
  3. Click on arrow of boarders button in Boarders section in design tab
  4. Select the "outside boarder" option from the list

<em>By following above mentioned steps, jennnine can draw a boarder around the table to distinguish it from rest of the document.</em>

8 0
4 years ago
Other questions:
  • Explain The Two Way Communication in full.
    10·1 answer
  • Ignorance of policy is a legal excuse for an employee. TRUE or FALSE
    11·1 answer
  • Which type of cover letter would the above excerpt come from?
    7·1 answer
  • Why does a CPU need Thermal Grease?
    14·1 answer
  • The online underground is used _____. Select 3 options. by law-abiding citizens only on Black Friday for networking by criminal
    11·1 answer
  • I need them on this question
    5·1 answer
  • Which is a method used with arrays?<br><br> find<br><br> index<br><br> insert<br><br> sort
    8·1 answer
  • How long is prison time for someone who commits copyright infringement for the first time ?
    7·1 answer
  • PORFA AYUDAAAA DOY CORONA (solo si puedo) ES DE TECNOLOGÍA
    12·1 answer
  • Chapter 20 reading and vocab review
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!