Which of the following network protocols is used for a secure command line interface for management of network devices?
A. SSH
B. TELNET
C. IGMP
D. HTTP
Ans: A. SSH
Computer Science & Information Technology
You might also like to view...
Given the following character array
char[] h = {‘H’, ‘E’, ‘L’, ‘L’, ‘O’}; Write a Java statement that will create a new String object from the character array.
Computer Science & Information Technology
A large storage area known as a(n) activation record is created at program startup.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the following interfaces, developed by Microsoft, is a set of interfaces that enable applications to access data stored in a database management system (DBMS)?
A. OLE DB B. ODBC C. ADO D. JDBC
Computer Science & Information Technology
Which text box in the Paragraph Rules dialog box controls the vertical positioning of a rule above or below?
A. Baseline Shift B. Space Before C. Space After D. Offset
Computer Science & Information Technology