A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?
A. SSH in tunnel mode
B. RDP set to console connection
C. EAP-PEAP
D. SFTP
Answer: A. SSH in tunnel mode
You might also like to view...
A(n) __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial- of- service attacks.
A) replay B) availability C) masquerade D) integrity
Which of the following statements is true?
a. System.out.print("Enter your age: "); prompts the user to take action. b. Class names typically begin with a capital letter. c. Package java.lang is imported in every Java program. d. All of the above are true.
Themes simplify the process of creating a presentation by providing ready-made, professional-looking background graphics, fonts, and other visual elements, designed to complement each other.
Answer the following statement true (T) or false (F)
A(n) ____ shows the relationship between screens in an interactive GUI program.
A. relationship diagram B. relationship plan C. interactivity diagram D. interaction plan