单选题Which of the following protocols uses port 80?()ASMTPBHTTPCHTTPSDFTP
单选题
Which of the following protocols uses port 80?()
A
SMTP
B
HTTP
C
HTTPS
D
FTP
参考解析
解析:
暂无解析
相关考题:
Which of the following devices would need to be configured to block specific ports and protocols from entering the network?() A. BridgeB. FirewallC. Port replicatorD. Gateway
Traffic coming across port 443 is for which of the following protocols?() A.SFTPB.FTPC.HTTPD.HTTPS
Which of the following monitors a server to see which protocols might be in use?() A. Ping sweepB. Intrusion detection softwareC. Port scannerD. Wireless packet sniffer
Which of the following is the BEST way to allow web software through the server firewall?() A. Implement an application exception.B. Implement an access control list (ACL).C. Open the corporate firewall to allow port 80.D. Implement port blocking on port 80.
Which of the following monitors a server to see which protocols might be in use?()A、Ping sweepB、Intrusion detection softwareC、Port scannerD、Wireless packet sniffer
Which of the following statements is true about a router's eBGP peers that is not also true about that same router's iBGP peers?()A、The eBGP peer neighborship uses TCPB、The eBGP peer uses port 180 (default)C、The eBGP peer uses the same ASN as the local routerD、The eBGP peer updates its AS_Path PA before sending updates to this router
Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.
Which of the following routing protocols is a link state and uses a backbone called area 0?()A、OSPFB、EIGRPC、BGPD、IS-IS
Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?()A、OSPFB、IS-ISC、EIGRPD、BGP
Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()A、BridgeB、FirewallC、Port replicatorD、Gateway
单选题A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()AUpdate the antivirus applicationBInstall critical update security patchesCAdjust the software firewall settingsDReplace the current antivirus program
单选题Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?()AOSPFBIS-ISCEIGRPDBGP
多选题You have been asked to develop an application that uses only connection-oriented protocols. Which two protocols can you use?()APPPBUDPCTCPDICMP
单选题Which one of the following protocols uses both UDP and TCP ports for the transport layer operation?()AFTPBTFTPCSMTPDTelnetEDNS
单选题Traffic coming across port 443 is for which of the following protocols?()ASFTPBFTPCHTTPDHTTPS