Which of the following is the MOST common secure web server port?()A、22B、80C、110D、443
Which of the following is the MOST common secure web server port?()
- A、22
- B、80
- C、110
- D、443
相关考题:
Traffic coming across port 443 is for which of the following protocols?() A.SFTPB.FTPC.HTTPD.HTTPS
Which of the following is the BEST way to allow web software through the server firewall?() A. Implement an application exception.B. Implement an access control list (ACL).C. Open the corporate firewall to allow port 80.D. Implement port blocking on port 80.
Which of the following is the MOST common problem that occurs in server rooms?() A. Excessive coolingB. Dust buildupC. Poor ground wiresD. Wet floors
Which of the following standards or encryption types is the MOST secure for wireless networking?()A、WEPB、AESC、TKIPD、DES
Traffic coming across port 443 is for which of the following protocols?()A、SFTPB、FTPC、HTTPD、HTTPS
A technical specialist has a requirement to implement a 4-way POWER5 server with a small Web server partition and a high performance database server partition. The Web server provides a client front-end to the database server. The most important concerns are speed of communication between the Web server and the database and I/O speed of the database. Which of the following virtualization features would be most appropriate?()A、Virtual SCSIB、Virtual EthernetC、Virtual I/O ServerD、Micro-Partitioning
Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.
Which of the following methods of user authentication is the MOST secure?()A、CHAPB、KerberosC、TACACSD、EAP
A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?()A、RouteB、IfconfigC、NetstatD、Nslookup
Which of the following technologies is the MOST secure form of wireless encryption?()A、SSLB、WPAC、WEPD、TLS
Which of the following is the MOST common problem that occurs in server rooms?()A、 Excessive coolingB、 Dust buildupC、 Poor ground wiresD、 Wet floors
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable
Users are unable to access the Internet but the users are able to send/receive email from theirdesktops. Which of the following ports is MOST likely being blocked?()A、25B、80C、110D、143
Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server. Which type of connection should you configure? ()A、IPSECB、L2TPC、PPTPD、SSTP
You have an Exchange Server 2010 organization. Your network is separated from the Internet by a firewall. You need to identify the ports that must be opened on the firewall to allow clients from the Internet to usethe following connections methods:.Outlook Anywhere .Outlook Web App (OWA).Exchange ActiveSync .IMAP4 over Secure Sockets Layer (SSL) Which TCP ports should you identify?()A、25, 443 and 993B、26, 443 and 995C、25, 80, 143, and 3269D、80, 143, 443, and 389
You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network forTestKing.com. All servers on the TestKing.com network are configured to run Exchange Server 2010.At present the network is separated from the Internet by means of a firewall. You receive an instructionform management to ensure that customers from the Internet to use Outlook Anywhere, Outlook Web App(OWA), Exchange ActivSync as well as IMAP4 over Secure Sockets Layer (SSL). You thus need todetermine the TCP ports that you need to open. What should you do?()A、You should consider opening port 25, port 80, port 143 as well as port 3269.B、You should consider opening port 25, port 443 as well as port 993.C、You should consider opening port 80, port 143, port 443 as well as port 389.D、You should consider opening port 26, port 443 as well as port 995.
Which of the following ensures the MOST secure access to a server room?()A、 ID card readersB、 Server rack doorsC、 Biometric devicesD、 Locked doors
单选题You have an Exchange Server 2010 organization. Your network is separated from the Internet by a firewall. You need to identify the ports that must be opened on the firewall to allow clients from the Internet to usethe following connections methods:.Outlook Anywhere .Outlook Web App (OWA).Exchange ActiveSync .IMAP4 over Secure Sockets Layer (SSL) Which TCP ports should you identify?()A25, 443 and 993B26, 443 and 995C25, 80, 143, and 3269D80, 143, 443, and 389
单选题Which of the following ensures the MOST secure access to a server room?()A ID card readersB Server rack doorsC Biometric devicesD Locked doors
单选题Which of the following is the MOST common problem that occurs in server rooms?()A Excessive coolingB Dust buildupC Poor ground wiresD Wet floors
单选题Which of the following is the default HTTPS port?()A25B80C110D443