Which of the following protocols has similar functionality to Telnet but operates more securely than Telnet?

A. TFTP
B. SSH
C. SNAT
D. RSH


Answer: B. SSH

Computer Science & Information Technology

You might also like to view...

_______ is a problem that a computer cannot solve.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can save the Web page as a plain text file without embedded HTTP tags.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A Twitter hashtag feed shows tweets from a specific Twitter account._________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When Comcast was found to be interfering with BitTorrent traffic, what method was being used?

a. Comcast was creating access lists that blocked known BitTorrent trackers. b. Comcast was interjecting TCP segments with the RST (reset) field set. c. Comcast used DNS poisoning to prevent clients from talking to other BitTorrent users. d. Comcast used IP spoofing to impersonate other BitTorrent clients, then dropped traffic.

Computer Science & Information Technology