Which of the following is BEST used as a secure replacement for TELNET?

A. HTTPS
B. HMAC
C. GPG
D. SSH


Answer: D. SSH

Computer Science & Information Technology

You might also like to view...

Write a function that will copy the contents of file in.dat to the file out.dat. Check for successful file opening of both in.dat and out.dat. The loop that actually does the copy should terminate on end of file.

What will be an ideal response?

Computer Science & Information Technology

The default interpolation method is ____ interpolation.

a. Nearest Neighbor b. Bilinear c. Bicubic Automatic d. Bicubic Smoother

Computer Science & Information Technology

What Microsoft tool is used to remove system-specific data from Windows on the virtual hard disk?

A. SID Removal B. Windows Deployment Tool C. Sysprep D. Sysconfig

Computer Science & Information Technology

When you start PowerPoint 2016, what displays on the right side of the window?

A) Blank presentation and theme thumbnails B) A list of all PowerPoint files on the hard drive C) Recently-opened presentations D) A title slide for your presentation

Computer Science & Information Technology