A company was recently audited by a third party. The audit revealed the company’s network devices were transferring files in the clear. Which of the following protocols should the company use to transfer files?
A. HTTPS
B. LDAPS
C. SCP
D. SNMPv3
Answer: C. SCP
Computer Science & Information Technology
You might also like to view...
In batch processing systems, data processing is done _______ data capture.
A. immediately after B. some time later than C. immediately before D. some time before
Computer Science & Information Technology
Microphones and scanners are examples of ________ devices
Fill in the blank(s) with correct word
Computer Science & Information Technology
In a table of contents, click a(n) ________ or subheading, to go to a specific location in a document
Fill in the blank(s) with correct word
Computer Science & Information Technology
When column setting are being adjusted, the insertion point needs to be positioned only in the section to which Column Layout has been applied
Indicate whether the statement is true or false
Computer Science & Information Technology