COMPUTER NETWORKING

NETWORK SECURITY

FIREWALLS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You have recently installed a new Windows Server 2016 system. To ensure the accuracy of the system time, you have loaded an application that synchronizes the hardware clock on the server with an external time source on the internet. Now, you must configure the firewall on your network to allow time synchronization traffic through.Which of the following ports are you most likely to open on the firewall?
A
80
B
119
C
110
D
123
Explanation: 

Detailed explanation-1: -Expert Answer. The ideal way to give access to confidential resources over the internet is by using a virtual private network because encrypting all data ensures a safe connection between the client and server.

Detailed explanation-2: -Which of the following describes how access control lists can be used to improve network security? EXPLANATION An access control list filters traffic based on the IP header information, such as source or destination IP address, protocol, or socket number.

Detailed explanation-3: -Packet filtering firewalls allow or deny network packets based on the following criteria: The source IP address is where the packet is being sent from. The packet’s address is the destination IP address.

Detailed explanation-4: -Which port needs to be enabled to allow secure transactions? EXPLANATION To perform secure transactions, SSL on port 443 needs to be enabled. HTTPS uses port 443 by default.

There is 1 question to complete.