A company was recently audited by a third party. The audit revealed the company’s network devices were transferring files in the clear. Which of the following protocols should the company use to transfer files?

A. HTTPS
B. LDAPS
C. SCP
D. SNMPv3


Answer: C. SCP

Computer Science & Information Technology

You might also like to view...

In batch processing systems, data processing is done _______ data capture. 

A. immediately after  B. some time later than C. immediately before D. some time before

Computer Science & Information Technology

Microphones and scanners are examples of ________ devices

Fill in the blank(s) with correct word

Computer Science & Information Technology

In a table of contents, click a(n) ________ or subheading, to go to a specific location in a document

Fill in the blank(s) with correct word

Computer Science & Information Technology

When column setting are being adjusted, the insertion point needs to be positioned only in the section to which Column Layout has been applied

Indicate whether the statement is true or false

Computer Science & Information Technology