A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?

A. SSH in tunnel mode
B. RDP set to console connection
C. EAP-PEAP
D. SFTP


Answer: A. SSH in tunnel mode

Computer Science & Information Technology

You might also like to view...

A(n) __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial- of- service attacks.

A) replay B) availability C) masquerade D) integrity

Computer Science & Information Technology

Which of the following statements is true?

a. System.out.print("Enter your age: "); prompts the user to take action. b. Class names typically begin with a capital letter. c. Package java.lang is imported in every Java program. d. All of the above are true.

Computer Science & Information Technology

Themes simplify the process of creating a presentation by providing ready-made, professional-looking background graphics, fonts, and other visual elements, designed to complement each other.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____ shows the relationship between screens in an interactive GUI program.

A. relationship diagram B. relationship plan C. interactivity diagram D. interaction plan

Computer Science & Information Technology