You shall not pass

Which of these wireless security techniques would prevent an unauthorized workstation from getting an IP address from your access point? Pick two.

The mail must flow!

You need to configure your firewall to allow mail traffic between your mail server and the Internet. Which of these ports would be the most appropriate to open in your firewall?