Which of the following protocols would the network administrator use to protect login credentials when accessing a router terminal session?

A. SCP
B. SNMPv3
C. SSL
D. SSH


Answer: D. SSH

Computer Science & Information Technology

You might also like to view...

It’s possible to refill someone’s reservoir of goodwill after you’ve lowered it.

a. True b. False

Computer Science & Information Technology

The ________ is a feature used to create formulas in query criteria, form and report properties, and table validation rules

Fill in the blank(s) with correct word

Computer Science & Information Technology

According to the Organization for Internet Safety (OIS), which of the following  steps for a threat response process does the user become aware of the attack

A. Release B. Notification C. Discovery D. Resolution:

Computer Science & Information Technology

Case Based Critical ThinkingCase 1You are in the planning stages of designing a website to market children's books.  The continually expanding field of children's books makes this an exciting adventure. Answer the following two questions about planning the site. Who is the target audience?

A. Babies B. Teenagers C. Parents D. The publishing company

Computer Science & Information Technology