SSH is a secure alternative to which of the following protocols?

A. FTP
B. Telnet
C. SMTP
D. SSL


B
Explanation: Protocols such as Telnet allow technicians to connect to devices such as routers, switches and wireless access points to manage them at the command line. Telnet however transmits in cleartext which is plainly a security issue, while SSH encrypts the information.

Computer Science & Information Technology

You might also like to view...

Sometimes called secret key algorithms, ____________________ key algorithms use the same key to encrypt and to decrypt the data.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Contrast is the difference between the darkest and lightest areas of an image.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The area surrounding a chart is called the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

To avoid confusion when using Word to develop webpages, you should not format your document by using Word heading styles, such as Heading 1, or Heading 2

Indicate whether the statement is true or false

Computer Science & Information Technology