Select the secure alternative to the telnet protocol:

A. HTTPS
B. TLS
C. IPsec
D. SSH


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following is not considered sensitive authentication data?

A) Full magnetic stripe data B) CAV2 code C) Expiration date D) CVC2 code

Computer Science & Information Technology

To decrease the bullet level of an item in a SmartArt graphic, click the ________ button

Fill in the blank(s) with correct word

Computer Science & Information Technology

In Excel, the term worksheet and ________ mean the same thing

A) spreadsheet B) datasheet C) reference sheet D) workbook

Computer Science & Information Technology

Internet security is divided into ____________________, or Web site areas, to which you can assign different levels of security.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology