dion training just installed a new webserver within a screened subnet. you have been asked to open up the port for secure web browsing on the firewall. which port should you set as open to allow users to access this new server? 443 80 21 143 see all questions back next question

Answers

Answer 1

The port that should be set as open to allow users to access this new server is port 443.

What is a Computer port?

In regards to computer hardware, a port is known to be a tool that helps to act as a kind of an interface that tend to exist between the computer as well as other computers or peripheral units or tools.

Note that  the port connote  the aspect of a computing device that is made available for connection to other forms of  peripherals such as input.

Therefore, based on the work above, the port that should be set as open to allow users to access this new server is port 443.

Learn more about port from

https://brainly.com/question/28391396
#SPJ1


Related Questions

**Random answers to get points will be reported.**

Identify the error in the following block of code.

for x in range(2, 6):
print(x)

The first line is missing quotes.
The first line has a spelling error.
The second line has a spelling error.
The second line needs to be indented four spaces.

Answers

Answer

I think its: The first line is missing quotes

Explanation:

Answer:

B

Explanation:

"(2, 6)" the space in between those numbers create a bad income I tried it and it was the problem so hence its B

whats the dialog box look like

Answers

A dialog box looks like a popup menu that appears on the window in the form of a box.

What is a dialog box?

A program can build a temporary window called a dialog box to collect input from the user. Normally, dialog boxes are used by applications to ask the user for further details on menu options.

A small window-like pictorial control method known as a dialog box asks the user for input and provides data to consumers. If a dialog box prevents users from interacting with the application that opened it.

A program can build a temporary window called a dialog box to collect user input. Typically, a program will use text boxes to ask the client for further details on the menu.

Learn more about dialog box, here:

https://brainly.com/question/28445405

#SPJ1

The act of infiltrating a remote computer system is called​

Answers

Answer:

The act of infiltrating a remote computer system is called (remote)

Select the correct answer.
Linda is making handouts for her upcoming presentation. She wants the handouts to be comprehensible to people who do not attend her
presentation. Which practice should Linda follow to achieve this goal?
OA.
OB.
OC.
OD.
provide a summary of the presentation
make the handouts more image-oriented
speak in detail about each topic
provide onlya printout of the slideshow


Can someone please help me with this class b4 I lose my mind
Amos: xoxo_11n

Answers

Answer:

OA

Explanation:

I took this quiz

in the Leaflet, using columns Makes your text difficult to read.
TRUE OR FALSE

Answers

True. I’m not sure but i think its true

What is bill Gates passion?

Answers

Computing. He makes software design and that revolves around computing

tO CrEaTe ToiLeT. Sorry, the real answer is to change the world via technology, and to keep on innovating.

I hope this helps, and Happy Holidays! :)

cynthia wants to make an exact copy of a drive using a linux command-line tool. what command should she use?

Answers

The Linux command-line tool that is the command she can use is kwon as option b:  cp.

Which Linux command creates a copy of a drive?

On Unix kind of operating systems, the cp command is known to be the tool that a person can be able to use to makes some replicas of files as well as directories.

Note that since Cynthia wants to make an exact copy of a drive using a Linux command-line tool, she can use the above command.

Hence, The Linux command-line tool that is the command she can use is kwon as option b:  cp.

Learn more about Linux command from

https://brainly.com/question/13615023

#SPJ1

Cynthia wants to make an exact copy of a drive using a Linux command-line tool. What command should she use? A. df B. cp C. dd D. ln

which one of the following would not normally be found in an organization's information security policy?

Answers

Requirement to use AES-256 encryption would not normally be found in an organization's information security policy.

When it comes to information security, organizations have a variety of different policies and requirements that they adhere to. One of those requirements is the use of AES-256 encryption.

However, not every organization has AES-256 encryption as a requirement in their information security policy. In fact, many organizations don't even know what AES-256 encryption is.

Why is AES-256 encryption relevant?

Well, AES-256 encryption is a strong form of encryption that is used to protect data. It is often used by governments and organizations to protect sensitive data.

AES-256 encryption is a requirement for many organizations because it provides a high level of security for data. Without AES-256 encryption, data could be compromised.

Learn more about information security policy here:

https://brainly.com/question/14292882

#SPJ4

Which feature helps a user navigate through the slides of a presentation

-Backstage view
-Open screen
-Status bar
-Thumbnail pane

Answers

Answer:

Thumbnail pane

Explanation:

Order the steps to outline how images are grouped in PowerPoint.

Step 1:

Step 2:

Step 3:

Step 4:

Answers

Answer: Step1: select all images

Step2: go to the pictures tool format

Step3: choose the arrange group

Step4: choose the group option

Explanation:

The order of the steps that outline how images are grouped in PowerPoint is as follows:

Step 1: Select all images.Step 2: Go to the pictures tool format.Step 3: Select the arranged group.Step 4: Select the group option.

What is the importance of PowerPoint?

The importance of PowerPoint is determined by the fact that it is most frequently utilized in order to construct presentations for personal and professional purposes or objectives.

In these personal or professional presentations, complex ideas, facts, or figures are easily inserted to make them more attractive and meaningful.

While you are inserting these tools in your Powerpoint, a sequence of steps is followed to make the interpretation more accurate. For example, if you want to group images in PowerPoint, you must definitely follow four steps in sequential order.

Therefore, the order of the steps that outline how images are grouped in PowerPoint is well mentioned above.

To learn more about MS PowerPoint, refer to the link:

https://brainly.com/question/23714390

#SPJ3

Which headline paints the following scenario in a positive light?
A. Fire Saves Community
B. Fire Devastates Community
C. Fire Lasts Three Hours
D. Firefighters Battle Blaze

Answers

Answer:

I suppose D

Explanation:

it is the most realistic whilst also being somewhat positive

what is another name for a man-in-the-middle attack

Answers

Answer:

Close to you or with malware

Explanation:

there i beleive

What is network redundancy???? ​

Answers

Network redundancy is a process through which additional or alternate instances of network devices, equipment and communication mediums are installed within network infrastructure. It is a method for ensuring network availability in case of a network device or path failure and unavailability. As such, it provides a means of network failover.

Explanation:

I hope it will help you...

Question # 4
Multiple Choice
Which step comes first?

Process the data.

Gather data from the user.

Check for accuracy.

Define the problem.

Answers

Answer:

The answer is Define the problem.

Explanation:

Write a program that reads the student mark and absent percentage and displays a proper message for student status considering the pass mark is 60 and the maximum
allowed absent percentage rate is 15%. As an optional challenge you may enhance the program by considering some absences are excused and shall not be counted.

Answers

To write a program that reads the student mark and absent percentage and displays a proper message for student status considering the pass mark is 60 and the maximum allowed absent percentage rate is 15%, you would need an algorithm and it is given below.

The Algorithm

Step 1: Start the execution of the program

Step 2: Read mark and absent percentage

Step 3: Checking if the given mark is greater than 60, if yes, displays the preassigned message

Step 4: If the mark is above 60

Step 5: Display, "Checking your absent record"

Step 6: If the absent percentage record is less than or equals to 15%

Step 7: Display, "This is a pass mark"

Step 8: Else, display "You failed"

Step 9: End program

What is an Algorithm?

This refers to the sequence of steps that are followed in order to help write a program for use.

Hence, To write a program that reads the student mark and absent percentage and displays a proper message for student status considering the pass mark is 60 and the maximum allowed absent percentage rate is 15%, you would need an algorithm and it is given above.

.

Read more about algorithms here:

https://brainly.com/question/24953880

#SPJ1

Each symbol of an octal number corresponds to 3 bits of a binary number. is it true or false​

Answers

Answer: True.

Explanation: It uses only the 3 bits to represent any digit in binary and easy to convert from octal to binary and then to vice-versa. Hope that helps

What is an important theme in "Once Upon a Time"?


the unity between all peoples

the disintegration of South African society

the birth of a new nation

the importance of self-reliance

Answers

Answer:

The disintegration of South African society.

Explanation:

Nadine Gordimer's "Once Upon A Time" revolves around the racist "Apartheid" time of South African society where the whites 'dominate' the blacks. the story focuses on the societal issues between the two races and how it is detrimental to the overall lives of the people involved.

One important theme of the story is racism, "Apartheid" which seemingly dictates who is superior and who is not. The huge divide in not only the living spheres of the two groups of citizens but also in their approaches to society is indicative of the discriminative attitude and perception of the people, especially with the whites claiming themselves to be superior and 'civilized'. The book deals largely with the colonial mindset of the whites while also the structural bigotry apparent in the mindset of the people.

Thus, the correct answer is the second option.

Answer:

The disintegration of South African society.

Explanation:

Which character in smash is the easiest to learn????

Answers

Answer:

kirby

Explanation:

jeksjdnskkdndjsjsj

I’d say Kirby as well, so there you go

What is the next line?
tupleA = (5, 20, 30, 40, 30)
tupleA.index(40)

The next line is

Answers

Answer:3

Explanation: it’s 3

Answer:

3

Explanation:

who are bill Gates customers?

Answers

Bill Gates has customers from Microsoft.

Your answer is Microsoft!

Answer:

Microsoft people! The people who buy pcs and xboxs

Explanation:

Samantha is looking for a lens that is lightweight and small, making it easy to transport. She doesn’t care about the lens being interchangeable nor does she need to zoom as she prefers to move physically closer to her subjects. She wants a simple lens that has the ability to produce a natural perspective. What kind of lens is likely best for Samantha?

Select one:
a. micro
b. zoom
c. telephoto
d. prime

Answers

Answer:

The correct option is;

d. Prime

Explanation:

A prime lens is a unifocal, or fixed-focal-length lens and it is referred to as the opposite of a zoom lens

The maximum aperture of ranges from f2.8 to f1.2, which are fast and have a creamy rendering of light that are out of focus, and also provide crispy image details, by making the most use of the light available and provide distinct combination of foreground and background images in pictures that give a crisp and visually pleasing appearance.

Grade 8 technology term 3

Answers

Explanation:

I am from Nepal County it is beautiful country

What is one of the main problems with shared web hosting? Select one: Sites that share resources are less susceptible to hacking because they share their anti-virus resources. Even if several of the shared sites go down, then the other sites will keep the host from going down. If one or more of the shared sites go down, then there is a good chance that your site will go down as well. It is free.

Answers

Answer:

If one or more of the shared sites go down, then there is a good chance that your site will go down as well.

Explanation:

Shared web hosting is a form of web hosting service whereby more than one websites are placed on a single web server that connects to the internet.

Though it is cheaper, it has various problems. And over time, it has been concluded that the major problem associated with shared web hosting is the security issue.

This implies that "If one or more of the shared sites go down, then there is a good chance that your site will go down as well."

Some other problems associated with Shared web hosting are poor value, less flexibility, none advanced features, slow service, less support.

Read the introduction (paragraphs 1-3].
Select the paragraph from the section that shows
how the test will make it seem as though the cars
are completely driverless, even though they are
not.

Answers

Yes so drunk drivers are more wreck less

1. The Monroe Doctrine was meant to
(2 Points)
establish US colonies.
O invite European nations to settle in the Louisiana Territory.
O protect US interest from European powers.
O end negotiations with France for the purchase of their American territory.

Answers

Answer:

protect us interest from European powers

Explanation:

declared that the United States would not allow European countries to interfere with independent governments in the Americas.

an intranet is a lan that uses internet technologies and is publicly available to people outside of the organization.

Answers

An intranet is a LAN that uses internet technologies and is publicly available to people outside of the organization: False.

What is an intranet?

An intranet can be defined as an internal company or organizational network which is designed and developed to be used privately. Also, it is used for providing the employees of a company with easy access to data or information.

In Computer networking, its only the end users of an intranet that have the ability to access a company's or organization's entire intranet.

In this context, we can reasonably infer and logically deduce that an intranet is a LAN that uses internet technologies and is privately available to people inside of the organization

Read more on intranet here: https://brainly.com/question/2580626

#SPJ1

Complete Question:

An intranet is a LAN that uses internet technologies and is publicly available to people outside of the organization. True of False

this is very simple i just need someone to type out this for me

Answers

Answer:

#27

2i , -2i, i, -i            i^2 = -1

1(x - 2i)(x + 2i) 1(x-i)(x+i)

x^2 +2x-2x -4.2i x^2 -xi-xi -i

(x^2 + 4)      x^4 + 1

x^2 +x^2 +11x

x^4 +5x^2 +4

+4+2+2+-1

*This was not simple for me

Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices. True or false?.

Answers

Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices: True.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data through the central processing unit (CPU) into an output (information) that could be used by an end user.

What is a computer hardware?

A computer hardware can be defined as a physical component of an information technology (IT) or computer system that can be seen and touched such as:

Random access memory (RAM).Read only memory (ROM).Central processing unit (CPU)KeyboardMonitorMouseMotherboard bios chip

Generally, embedded computers such as robotic vacuum cleaners, smart wrist-watches, home security systems, etc., usually are small and have limited hardware, but are designed and developed to enhance the capabilities of everyday devices.

Read more on embedded computers here: https://brainly.com/question/14614871

#SPJ1

A form of encryption that uses only one key to encrypt and decrypt a file. This is a less
secure form of encryption
O Wiretapping
Symmetric Encryption
Type 2 Authentication
Asymmetric Encryption

Answers

Answer:

symmetric encryption

Explanation:

Asymmetric encryption uses 2 keys.

n2care has one product, the medcottage, that is prefabricated and pre-equipped with medical equipment used by nursing homes. n2care is utilizing a(n) targeting strategy.

Answers

Based on the above, the n2care is utilizing a concentrated targeting strategy.

What is concentrated targeting strategy?

The term Concentrated marketing is known to be a kind of a marketing strategy where the firm or a company is known to be based on one single target market group for all of their marketing goals or initiatives.

Note that Companies are said to make use concentrated marketing to tell more on how their products can be able to reach or meet the special needs of their niche audience.

Therefore, Based on the above, the n2care is utilizing a concentrated targeting strategy.

Learn more about targeting strategy from

https://brainly.com/question/17198359

#SPJ1

N2Care has one product, the MEDCottage, that is pre-fabricated and pre-equipped with medical equipment used by nursing homes. N2Care is utilizing a(n) _______ targeting strategy.

multisegment

undifferentiated

concentrated

mass marketing

Other Questions
In the Loyalty Dance song, students sang: No matter how close our parents are to us, they are not as close as our relationship with Mao. What does this line mean? How did Maos government expect people to act during the Cultural Revolution? Which of the following is a radical equation?+5 = 12X+NO x = 16O 3+x7=1307x=14 The number one show in the 1980's that centered on an upper middle class educated family where the father was a doctor and the motherwas a lavwyer and the family was not stereotyped but treated like a regular family was called....The JeffersonsGood TimesThe Cosby ShowSandford and Son To provide for a _______ of powers three separate branches of government. Each has its own _______ and at the same time they work together to make the country run smoothly. This is done through a series of _____ ____ ________. Its a do now, which means its DUE NOW. Please help!! maria wishes to buy gasoline and have her car washed. she finds that if she buys 9 gallons of gasoline at $2.50 per gallon, the car wash costs $2, but if she buys 10 gallons of gasoline, the car wash is free. for maria, the marginal cost of the tenth gallon of gasoline is group of answer choices zero. I just need help plz!_______ is the process of using a specific material to speed up a chemical reaction, leaving the material unchanged at the end of the reaction. Why did Lewis and Clark embark on the expedition of the Louisiana Purchace?To have an adventure.To have an adventure.To explore the newest addition of land to the United States. To explore the newest addition of land to the United States. To open a fur-trading fort in the West.To open a fur-trading fort in the West.To share their religion and way of life. Writing a StoryThis activity will help you meet these educational goals:You will engage readers by establishing a context and introducing characters and setting to a story, organize an event sequence that unfolds naturally and logically, and use relevant descriptive details and sensory language to convey experiences and events.DirectionsRead the instructions for this self-checked activity. Type in your response to each question, and check your answers. At the end of the activity, write a brief evaluation of your work.ActivityIn this activity, youll write an introduction to a story. In the introduction, youll establish the setting and describe the characters. Choose a topic from the following list or make up your own.finding a long-lost letterfinding something unusual hidden undergroundinvestigating a crimediscovering a new planet or solar systemwinning the lotteryPart AWhat topic did you choose? Where and when will your story take place? What characters will be in the story?Characters used: 0 / 15000Part BWrite one to two paragraphs that establish the setting and describe the characters in your story. Be sure to use descriptive details, such as sensory language and figurative language.Characters used: 0 / 15000Part CWhat descriptive details did you use in your introduction? Provide examples from your writing.Characters used: 0 / 15000Self-EvaluationHow did you do? Rate your work on a scale of 1 to 5, with 5 as the highest score. Then write a brief evaluation of your work below. Note what you learned and what challenged you.Writing a StoryThis activity will help you meet these educational goals:You will engage readers by establishing a context and introducing characters and setting to a story, organize an event sequence that unfolds naturally and logically, and use relevant descriptive details and sensory language to convey experiences and events.DirectionsRead the instructions for this self-checked activity. Type in your response to each question, and check your answers. At the end of the activity, write a brief evaluation of your work.ActivityIn this activity, youll write an introduction to a story. In the introduction, youll establish the setting and describe the characters. Choose a topic from the following list or make up your own.finding a long-lost letterfinding something unusual hidden undergroundinvestigating a crimediscovering a new planet or solar systemwinning the lotteryPart AWhat topic did you choose? Where and when will your story take place? What characters will be in the story?Characters used: 0 / 15000Part BWrite one to two paragraphs that establish the setting and describe the characters in your story. Be sure to use descriptive details, such as sensory language and figurative language.Characters used: 0 / 15000Part CWhat descriptive details did you use in your introduction? Provide examples from your writing.Characters used: 0 / 15000Self-EvaluationHow did you do? Rate your work on a scale of 1 to 5, with 5 as the highest score. Then write a brief evaluation of your work below. Note what you learned and what challenged you.sry for this English is hard :D and god bless I have dwelt upon the greatness of athens because i want to show you that we are contending for a higher prize than those who enjoy none of these privileges, and to establish by manifest proof the merit of these men whom i am now commemorating. . . . in magnifying the city i have magnified them, and men like them whose virtues made her glorious. "pericless funeral oration, 431 bce what is the main idea of the underlined phrase? people who live in athens are fighting to protect their privileged way of life. those who live in athens can win more privileges by fighting. dwelling in athens does not bring greatness. enjoying athenss privileges can lead to conflict. Steve Conway wants his team to win more than 57 games this year. His team has already won 2 games this season and there are 5 more months to play. Based on his goal, how many games must his team win per month? Write answer as an inequality. Solve Each Equation5. -8(5+4x)=-2326. -84=4(4r+7) On a coordinate plane, an absolute value graph has a vertex at (negative 4, negative 10). Which equation represents the function graphed on the coordinate plane? g(x) = |x 4| 10 g(x) = |x + 4| 10 g(x) = |x 10| + 4 g(x) = |x + 10| 4 Modeling and imitation of behavior are the primary characteristics of what kind of learning? Meaningful learningRote learningObservational learningCognitive learning How do you divide with a decimal if the number doesnt go into it?For example, 12 divided by 3.32 What is the answer for this?!!! I need help with this please rather than express life realistically on the stage, playwrights such as maurice maeterlinck wrote in this form of drama that sought to express the inner truth of life. describe the general trend in electronegativity as metals in group 2 on the periodic table are concidered in order of increasing atomic number Two warning lights flash on the fences of Jurassic Park. One light flashes every 3 seconds. Another light flashesevery 4 seconds. How many times will they flash at the same time over the course of one minute?