Which of the following network protocols is used for a secure command line interface for management of network devices?

A. SSH
B. TELNET
C. IGMP
D. HTTP


Ans: A. SSH

Computer Science & Information Technology

You might also like to view...

Given the following character array

char[] h = {‘H’, ‘E’, ‘L’, ‘L’, ‘O’}; Write a Java statement that will create a new String object from the character array.

Computer Science & Information Technology

A large storage area known as a(n) activation record is created at program startup.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following interfaces, developed by Microsoft, is a set of interfaces that enable applications to access data stored in a database management system (DBMS)?

A. OLE DB B. ODBC C. ADO D. JDBC

Computer Science & Information Technology

Which text box in the Paragraph Rules dialog box controls the vertical positioning of a rule above or below?

A. Baseline Shift B. Space Before C. Space After D. Offset

Computer Science & Information Technology