A recent vulnerability scan found that Telnet is enabled on all network devices. Which of the following protocols should be used instead of Telnet?
A. SCP
B. SSH
C. SFTP
D. SSL
Answer: B. SSH
Computer Science & Information Technology
You might also like to view...
The utility included with Windows 8 for managing files is called _____.
A. Windows Explorer B. File Utility C. File Manager D. File Explorer
Computer Science & Information Technology
Which type of class provides a means for users to work with the system?
A) entity B) boundary or interface C) abstract D) control
Computer Science & Information Technology
The ____ engine provides the means of subdividing the management of the huge amount of identity data that an IdM system processes.
A. modeling B. delegated administration C. audit D. workflow
Computer Science & Information Technology
What critical component of any OS, that can be can be vulnerable to attacks, is used to store and manage information?
A. SQL database B. file system C. WSUS D. NetBIOS
Computer Science & Information Technology