网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following protocols uses port 80?()
A
SMTP
B
HTTP
C
HTTPS
D
FTP
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following protocols uses port 80?()A SMTPB HTTPC HTTPSD FTP” 相关考题
考题
Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()
A. BridgeB. FirewallC. Port replicatorD. Gateway
考题
Traffic coming across port 443 is for which of the following protocols?()
A.SFTPB.FTPC.HTTPD.HTTPS
考题
Which of the following monitors a server to see which protocols might be in use?()
A. Ping sweepB. Intrusion detection softwareC. Port scannerD. Wireless packet sniffer
考题
Which of the following is the BEST way to allow web software through the server firewall?()
A. Implement an application exception.B. Implement an access control list (ACL).C. Open the corporate firewall to allow port 80.D. Implement port blocking on port 80.
考题
Which of the following monitors a server to see which protocols might be in use?()A、Ping sweepB、Intrusion detection softwareC、Port scannerD、Wireless packet sniffer
考题
Which of the following statements is true about a router's eBGP peers that is not also true about that same router's iBGP peers?()A、The eBGP peer neighborship uses TCPB、The eBGP peer uses port 180 (default)C、The eBGP peer uses the same ASN as the local routerD、The eBGP peer updates its AS_Path PA before sending updates to this router
考题
Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.
考题
Which of the following routing protocols is a link state and uses a backbone called area 0?()A、OSPFB、EIGRPC、BGPD、IS-IS
考题
Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?()A、OSPFB、IS-ISC、EIGRPD、BGP
考题
Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()A、BridgeB、FirewallC、Port replicatorD、Gateway
考题
单选题A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()A
Update the antivirus applicationB
Install critical update security patchesC
Adjust the software firewall settingsD
Replace the current antivirus program
考题
单选题Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?()A
OSPFB
IS-ISC
EIGRPD
BGP
考题
多选题Which two primary port authentication protocols are used with VSANs?()ASPAPBCHAPCDHCHAPDESP
考题
多选题You have been asked to develop an application that uses only connection-oriented protocols. Which two protocols can you use?()APPPBUDPCTCPDICMP
考题
单选题Which one of the following protocols uses both UDP and TCP ports for the transport layer operation?()A
FTPB
TFTPC
SMTPD
TelnetE
DNS
考题
单选题Traffic coming across port 443 is for which of the following protocols?()A
SFTPB
FTPC
HTTPD
HTTPS
热门标签
最新试卷