Which of the following was developed as a secure replacement for Telnet?

A. Telnet II
B. Secure Shell (SSH)
C. AES
D. IPSec


Answer: B

Computer Science & Information Technology

You might also like to view...

The Enforce Referential Integrity box should normally be checked

Indicate whether the statement is true or false

Computer Science & Information Technology

NICs send and receive binary data as pulses of all of the following EXCEPT ___________.

A. electricity B. radio waves C. gamma rays D. light

Computer Science & Information Technology

A(n) ____________________ page design shrinks or expands to fit the size of the visitor's screen.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

COGNITIVE ASSESSMENT If you are running a check that applies a formula to the primary key, what kind of check are you running?

A. completeness B. alphabetic C. range D. check digit

Computer Science & Information Technology