answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: Which protocol should be block to prevent malicious attacks?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Communications

Which protocol should be blocked to prevent Trojan attacks?

You don't block a network protocol to prevent Trojan Horses from entering your computer. It is the ability to recognize threats and scams that enable you to defend your computer.


What does Port25 have to do with spam emails?

The Simple Mail Transfer Protocol (SMTP) used as the standard for e-mail transmission uses Transmission Control Protocol (TCP) port 25. As such spam filters will often monitor Port 25 to determine if the email coming through should be allowed on or flagged.


What is the definition of the phrase protocol having been established?

The phrase "protocol having been established" refers to a situation where a set of rules, guidelines, or procedures has been put in place and is now officially recognized or accepted. It indicates that a protocol or a system of agreed-upon norms and practices has been established and is currently in effect. The phrase implies that the necessary steps or actions have been taken to define and establish the protocol, typically through a process of planning, agreement, and implementation. Once the protocol is established, it is expected to be followed and adhered to in order to ensure consistency, order, and efficient functioning within a specific context or domain. "Protocol having been established" suggests that the protocol is now an established framework that governs actions, interactions, or processes, and it may be referenced to indicate that the agreed-upon procedures are in place and should be followed accordingly.


Why should you buy a commercial security system?

You should buy a commercial security system to alert you of a break in. The alarm could also prevent robbery or dissuade the thief to continue through the house.


How do you find my spam folder?

It is easy to spot a spam in your folder or email - here are some things you should check:UnsolicitedContains malicious words (e.g. adult words)Contains links to questionable domains/sitesContains info like to good to be true offersContains info on winning lottery or other prizes

Related questions

Which protocol should be blocked to prevent Trojan attacks?

You don't block a network protocol to prevent Trojan Horses from entering your computer. It is the ability to recognize threats and scams that enable you to defend your computer.


What protocols should be blocked to prevent trojans and malicious traffic?

ICMP


What computer protocol should be blocked to prevent malicious traffic and Trojan's?

Pretty much every protocol used for malicious traffic and Trojans is also used for legitimate traffic. You cannot block all bad traffic just by filtering on protocols. When given that ICMP and HTTP are both allowed, if you have to block one, block ICMP. Choices were: DNS DHCP ICMP HTTP https://library.skillport.com/courseware/cbtlib/TPSY0201/metadata/eng/TPSY0201B.htm?


What To prevent viruses and the download of malicious code should not be done?

Access websites in e-mail/popups


Advantages of two phase locking protocol?

Two Phase locking protocol prevent deadlock. This protocol maintain the schedule which lock should be granted or not. For more information I think this link help you. http://www.databaseidea.com/2012/03/two-phase-locking-protocol.html


What should you do when you see children abuse?

If you witness child abuse firsthand, immediately contact social services or the police to stop and prevent the malicious acts from continuing!


Which device or devices should have the Spanning Tree Protocol enabled to prevent host traffic from creating a broadcast storm?

Core_S1, Access_S2, and Access_S3


Which service should be disabled on a Cisco switch or router to prevent packet sniffers from capturing information about the device?

CDP-(Cisco Discovery Protocol)


Needs a specialized IPS to limit his exposure to SQL injection attacks against his web server exposed to the public network. He should consider purchasing an?

He should consider purchasing the Application Protocol IDS (APIDS).


Should you avoid viewing email messages in plain text to stop spreading malicious code?

On the contrary... Plaintext format kill most malicious code and prevent your mailbox automatically do stuff (downloading images, opening link...etc). Keep using plain text.


Why should debris resulting from an attack be cleared as soon as possible?

to prevent damage debris from becoming airborne as a result of future attacks


Gary needs a specialized IPS to limit his exposure to SQL injection attacks against his web server exposed to the public network He should consider purchasing an?

He should consider purchasing the Application Protocol IDS (APIDS).