FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A FIREWALL IN NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
In the output of the netstat command, you notice that a remote system has made a connection to your Windows Server 2016 system using TCP/IP port 21. Which of the following actions is the remote system most likely performing?
A
Downloading a file
B
Downloading email
C
Downloading a web page
D
Performing a name resolution request
Explanation: 

Detailed explanation-1: -Expert Answer. The ideal way to give access to confidential resources over the internet is by using a virtual private network because encrypting all data ensures a safe connection between the client and server.

Detailed explanation-2: -Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks? A bastion or sacrificial host is one that is unprotected by a firewall. The term bastion host is used to describe any device fortified against attack (such as a firewall).

Detailed explanation-3: -TFTP (explanation: The trivial file transfer protocol (TFTP) uses TCP/IP port 69. TFTP is a connectionless service for downloading files from a remote system.

There is 1 question to complete.