网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following ports MUST be open on the firewall to allow remote desktop connection and remote assistance traffic through?()
A

21

B

443

C

3389

D

8080


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following ports MUST be open on the firewall to allow remote desktop connection and remote assistance traffic through?()A 21B 443C 3389D 8080” 相关考题
考题 Which of the following components must be elected before the Spanning Tree Protocol can converge in a switched LAN?A. Designated ports.B. Duplex operating mode.C. Fast mode ports.D. Root bridge.E. Root ports.F. BDPU priority.

考题 Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO). A.22B.23C.143D.161E.162F.8080

考题 Which of the following is the BEST way to allow web software through the server firewall?() A. Implement an application exception.B. Implement an access control list (ACL).C. Open the corporate firewall to allow port 80.D. Implement port blocking on port 80.

考题 A new VLAN needs to be created for an existing network. Which of the following are the minimum tasks that must be accomplished in order to create the new VLAN?()A、The VLAN must be createdB、The VLAN must be namedC、An IP address and subnet mask must be configured for the new VLAND、The desired ports must be added to the new VLANE、The VLAN must be added to the existing VTP Domain

考题 Which of the following command line utilities can Karen, a technician, use to check for open ports?()A、nbtstatB、ipconfigC、nslookupD、netstat

考题 Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

考题 Which of the following components must be elected before the Spanning Tree Protocol can converge in a switched LAN?()A、designated ports.B、duplex operating mode.C、fast mode ports.D、root bridge.E、root ports.F、BDPU priority.

考题 Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.

考题 Which of the following ports should be allowed through a firewall for Telnet to function?()A、23B、25C、50D、110

考题 Which of the following default ports must be opened to allow a technician to telnet into a machine?()A、21B、23C、24D、25

考题 Which of the following ports MUST be open on the firewall to allow remote desktop connection and remote assistance traffic through?()A、21B、443C、3389D、8080

考题 A technician needs to check which ports are open in the Windows Firewall. Which of the following willallow the technician to view these settings?()A、netsh firewall show loggingB、ipconfig /allC、netsh firewall show stateD、arp -a

考题 A technician cannot connect using Remote Desktop. Which of the following ports needs to be allowed in the firewall? ()A、23B、443C、8080D、3389

考题 While performing a site survey to document the existing environment before implementing a new HACMP cluster, it was discovered that a port filtering firewall was being used to protect the production system. The plan is to continue using the firewall and add a second firewall to avoid a single point of failure. Each node in the two-node cluster will have all of its network adapters connected to the firewalls, and all connections to the nodes will pass through these firewalls.  What must be considered about HACMP in a firewall environment?()  A、 Firewalls are not supported in a HACMP environment.B、 HACMP uses only TCP/IP so firewalls are not relevant.C、 Specific ports must be open for HACMP communications.D、 Dynamic routing must be used to properly route packets in a firewall-protected environment.

考题 Which two statements are true regarding firewall user authentication?()A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

考题 You have an Exchange Server 2010 organization.  Your network is separated from the Internet by a firewall.  You need to identify the ports that must be opened on the firewall to allow clients from the Internet to usethe following connections methods:.Outlook Anywhere .Outlook Web App (OWA).Exchange ActiveSync .IMAP4 over Secure Sockets Layer (SSL) Which TCP ports should you identify?()A、25, 443 and 993B、26, 443 and 995C、25, 80, 143, and 3269D、80, 143, 443, and 389

考题 单选题An administrator needs to review the open ports on a host. Which of the following commands should they use?()A traceroute -dB ping -tC netstat -anoD nbtstat -a

考题 多选题Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO).A22B23C143D161E162F8080

考题 单选题Which type of firewall is needed to open appropriate UDP ports required for RTP streams?()A Stateful firewallB Proxy firewallC Packet filtering firewallD Stateless firewall

考题 单选题Which of the following default ports must be opened to allow a technician to telnet into a machine?()A 21B 23C 24D 25

考题 单选题A technician cannot connect using Remote Desktop. Which of the following ports needs to be allowed in the firewall? ()A 23B 443C 8080D 3389

考题 多选题Which of the following components must be elected before the Spanning Tree Protocol can converge in a switched LAN?()Adesignated ports.Bduplex operating mode.Cfast mode ports.Droot bridge.Eroot ports.FBDPU priority.

考题 单选题Which of the following ports should be allowed through a firewall for Telnet to function?()A 23B 25C 50D 110

考题 多选题Which two statements are true regarding firewall user authentication?()AWhen configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.CIf a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.DIf a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

考题 多选题Which two statements are true regarding firewall user authentication?() (Choose two.)AWhen configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.CIf a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .DIf a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

考题 多选题A new VLAN needs to be created for an existing network. Which of the following are the minimum tasks that must be accomplished in order to create the new VLAN?()AThe VLAN must be createdBThe VLAN must be namedCAn IP address and subnet mask must be configured for the new VLANDThe desired ports must be added to the new VLANEThe VLAN must be added to the existing VTP Domain

考题 单选题You have an Exchange Server 2010 organization.  Your network is separated from the Internet by a firewall.  You need to identify the ports that must be opened on the firewall to allow clients from the Internet to usethe following connections methods:.Outlook Anywhere .Outlook Web App (OWA) .Exchange ActiveSync .IMAP4 over Secure Sockets Layer (SSL) Which TCP ports should you identify?()A 25, 443 and 993B 26, 443 and 995C 25, 80, 143, and 3269D 80, 143, 443, and 389