Which of the following methods can move files in clear text and can be easily intercepted?

A. RSH
B. SNMP
C. FTP
D. TELNET


Answer: C. FTP

Computer Science & Information Technology

You might also like to view...

Token-ring frames are similar to Ethernet frames in that both contain ____ addresses.

A. source and destination B. source and origin C. origin and interface D. source and network

Computer Science & Information Technology

List and describe advantages of the database approach.

What will be an ideal response?

Computer Science & Information Technology

________ is a piece of data stored in a small text file to maintain information about the client during and between browser sessions.

a) tracking file b) cookie c) Web log d) virtual record

Computer Science & Information Technology

According to the ISO 12207-2008 standard, section 7.2.3, the review process focuses on what two kinds of assurance activities?

A. Testing and auditing B. Formal and informal reviews C. Product assurance and process assurance D. Quality and process assurance

Computer Science & Information Technology