单选题Which of the following ports MUST be open on the firewall to allow remote desktop connection and remote assistance traffic through?()A21B443C3389D8080
单选题
Which of the following ports MUST be open on the firewall to allow remote desktop connection and remote assistance traffic through?()
A
21
B
443
C
3389
D
8080
参考解析
解析:
暂无解析
相关考题:
Which of the following components must be elected before the Spanning Tree Protocol can converge in a switched LAN?A. Designated ports.B. Duplex operating mode.C. Fast mode ports.D. Root bridge.E. Root ports.F. BDPU priority.
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO). A.22B.23C.143D.161E.162F.8080
Which of the following is the BEST way to allow web software through the server firewall?() A. Implement an application exception.B. Implement an access control list (ACL).C. Open the corporate firewall to allow port 80.D. Implement port blocking on port 80.
A new VLAN needs to be created for an existing network. Which of the following are the minimum tasks that must be accomplished in order to create the new VLAN?()A、The VLAN must be createdB、The VLAN must be namedC、An IP address and subnet mask must be configured for the new VLAND、The desired ports must be added to the new VLANE、The VLAN must be added to the existing VTP Domain
Which of the following command line utilities can Karen, a technician, use to check for open ports?()A、nbtstatB、ipconfigC、nslookupD、netstat
Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
Which of the following components must be elected before the Spanning Tree Protocol can converge in a switched LAN?()A、designated ports.B、duplex operating mode.C、fast mode ports.D、root bridge.E、root ports.F、BDPU priority.
Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.
Which of the following ports should be allowed through a firewall for Telnet to function?()A、23B、25C、50D、110
Which of the following default ports must be opened to allow a technician to telnet into a machine?()A、21B、23C、24D、25
Which of the following ports MUST be open on the firewall to allow remote desktop connection and remote assistance traffic through?()A、21B、443C、3389D、8080
A technician needs to check which ports are open in the Windows Firewall. Which of the following willallow the technician to view these settings?()A、netsh firewall show loggingB、ipconfig /allC、netsh firewall show stateD、arp -a
A technician cannot connect using Remote Desktop. Which of the following ports needs to be allowed in the firewall? ()A、23B、443C、8080D、3389
While performing a site survey to document the existing environment before implementing a new HACMP cluster, it was discovered that a port filtering firewall was being used to protect the production system. The plan is to continue using the firewall and add a second firewall to avoid a single point of failure. Each node in the two-node cluster will have all of its network adapters connected to the firewalls, and all connections to the nodes will pass through these firewalls. What must be considered about HACMP in a firewall environment?() A、 Firewalls are not supported in a HACMP environment.B、 HACMP uses only TCP/IP so firewalls are not relevant.C、 Specific ports must be open for HACMP communications.D、 Dynamic routing must be used to properly route packets in a firewall-protected environment.
Which two statements are true regarding firewall user authentication?()A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
You have an Exchange Server 2010 organization. Your network is separated from the Internet by a firewall. You need to identify the ports that must be opened on the firewall to allow clients from the Internet to usethe following connections methods:.Outlook Anywhere .Outlook Web App (OWA).Exchange ActiveSync .IMAP4 over Secure Sockets Layer (SSL) Which TCP ports should you identify?()A、25, 443 and 993B、26, 443 and 995C、25, 80, 143, and 3269D、80, 143, 443, and 389
单选题An administrator needs to review the open ports on a host. Which of the following commands should they use?()Atraceroute -dBping -tCnetstat -anoDnbtstat -a
多选题Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO).A22B23C143D161E162F8080
单选题Which type of firewall is needed to open appropriate UDP ports required for RTP streams?()AStateful firewallBProxy firewallCPacket filtering firewallDStateless firewall
单选题Which of the following default ports must be opened to allow a technician to telnet into a machine?()A21B23C24D25
单选题A technician cannot connect using Remote Desktop. Which of the following ports needs to be allowed in the firewall? ()A23B443C8080D3389
多选题Which of the following components must be elected before the Spanning Tree Protocol can converge in a switched LAN?()Adesignated ports.Bduplex operating mode.Cfast mode ports.Droot bridge.Eroot ports.FBDPU priority.
单选题Which of the following ports should be allowed through a firewall for Telnet to function?()A23B25C50D110
多选题Which two statements are true regarding firewall user authentication?()AWhen configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.CIf a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.DIf a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
多选题Which two statements are true regarding firewall user authentication?() (Choose two.)AWhen configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.CIf a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .DIf a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
多选题A new VLAN needs to be created for an existing network. Which of the following are the minimum tasks that must be accomplished in order to create the new VLAN?()AThe VLAN must be createdBThe VLAN must be namedCAn IP address and subnet mask must be configured for the new VLANDThe desired ports must be added to the new VLANEThe VLAN must be added to the existing VTP Domain
单选题You have an Exchange Server 2010 organization. Your network is separated from the Internet by a firewall. You need to identify the ports that must be opened on the firewall to allow clients from the Internet to usethe following connections methods:.Outlook Anywhere .Outlook Web App (OWA) .Exchange ActiveSync .IMAP4 over Secure Sockets Layer (SSL) Which TCP ports should you identify?()A25, 443 and 993B26, 443 and 995C25, 80, 143, and 3269D80, 143, 443, and 389