A recent vulnerability scan found that Telnet is enabled on all network devices. Which of the following protocols should be used instead of Telnet?

A. SCP
B. SSH
C. SFTP
D. SSL


Answer: B. SSH

Computer Science & Information Technology

You might also like to view...

The utility included with Windows 8 for managing files is called _____.

A. Windows Explorer B. File Utility C. File Manager D. File Explorer

Computer Science & Information Technology

Which type of class provides a means for users to work with the system?

A) entity B) boundary or interface C) abstract D) control

Computer Science & Information Technology

The ____ engine provides the means of subdividing the management of the huge amount of identity data that an IdM system processes.

A. modeling B. delegated administration C. audit D. workflow

Computer Science & Information Technology

What critical component of any OS, that can be can be vulnerable to attacks, is used to store and manage information?

A. SQL database B. file system C. WSUS D. NetBIOS

Computer Science & Information Technology