What is the protocol for SSH (Secure Shell)?

A. TCP 21
B. TCP 22
C. TCP 23
D. TCP 20


Answer: B. TCP 22

Computer Science & Information Technology

You might also like to view...

The ____________________ statement designates the technique Access uses to compare and sort text data.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ____________ is critical to ICT acquisition because it provides the sole point of reference for the bidding process.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The tables or queries from which a report's data is taken are known as the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

In C++, you can use a(n) ____________________ to instruct a program to mark those memory locations in which data is fixed throughout program execution.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology