Which of the following protocols would the network administrator use to protect login credentials when accessing a router terminal session?
A. SCP
B. SNMPv3
C. SSL
D. SSH
Answer: D. SSH
You might also like to view...
It’s possible to refill someone’s reservoir of goodwill after you’ve lowered it.
a. True b. False
The ________ is a feature used to create formulas in query criteria, form and report properties, and table validation rules
Fill in the blank(s) with correct word
According to the Organization for Internet Safety (OIS), which of the following steps for a threat response process does the user become aware of the attack
A. Release B. Notification C. Discovery D. Resolution:
Case Based Critical ThinkingCase 1You are in the planning stages of designing a website to market children's books. The continually expanding field of children's books makes this an exciting adventure. Answer the following two questions about planning the site. Who is the target audience?
A. Babies B. Teenagers C. Parents D. The publishing company