Highly classified data is being shared on a company network. The systems administrator needs to ensure the data is safe and only necessary personnel can access it. Which of the following protocols would be BEST to use for this type of data to be shared?
A. SSH
B. SCP
C. NTP
D. FTP
Answer: B. SCP
You might also like to view...
List four of the seven activities specified by the EBK for incident management.
What will be an ideal response?
What is UTM?
a. Unified Traffic Management is an all-in-one solution that integrates a wide range of security features into multiple appliances. b. Unified Threat Management is an all-in-one solution that integrates a wide range of security features into multiple appliances. c. Unified threat management is an all-in-one solution that integrates a wide range of security features into one appliance
When presentations contain two or more styles or themes, a different ________ can be used for each theme
A) theme layout B) slide layout C) slide master D) master style
A SPAN is a special type of security network
Indicate whether the statement is true or false