Match each item with an statement below:

A. UNIX-based command interface and protocol for securely accessing a remote computer.
B. can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
C. encrypts both the header and the data portion.
D. "plain" HTTP sent over SSL/TLS.
E. the end of the tunnel between VPN devices.
F. handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
G. most widely deployed tunneling protocol.
H. encrypts all files or selected directories and files on a Linux system.
I. one of the ways to reduce the risk of FTP attack.


A. SSH
B. Layer 4-7 device
C. IPsec tunnel mode
D. HTTPS
E. Endpoint
F. VPN Client
G. PPTP
H. CFS
I. Secure FTP (SFTP)

Computer Science & Information Technology

You might also like to view...

What is the major difference between the ext2 and ext3 file systems?

What will be an ideal response?

Computer Science & Information Technology

____ audits utilize an external group of individuals who are hired or employed by the government or other standard-setting groups for the purpose of conducting an audit.

A. Standard B. Policy C. Automated D. Formal

Computer Science & Information Technology

Only visible worksheet tabs can be grouped

Indicate whether the statement is true or false.

Computer Science & Information Technology

Times New Roman Bold 12 pt. is a typeface.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology