Which of the following networking protocols is used to give the remote computer secure command line access to the server?

A. SSH
B. Telnet
C. ICMP
D. RTP


Answer: A. SSH

Computer Science & Information Technology

You might also like to view...

Keyboards that display on screen when input of text is required are known as virtual keyboards

Indicate whether the statement is true or false

Computer Science & Information Technology

In hacking activities, one computer provides the ________ for the criminal activity, while another serves as the target

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An instant message conversation consists of text exchanges called a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A user program executes in a kernel mode in which certain areas of memory are protected from the user’s use and certain instructions may not be executed. 2. Any program that is owned by, and SetUID to, the “superuser” potentially grants unrestricted access to the system to any user executing that program. 3. Traditional RBAC systems define the access rights of individual users and groups of users. 4. A constraint is a defined relationship among roles or a condition related to roles. 5. An ABAC model can define authorizations that express conditions on properties of both the resource and the subject.

Computer Science & Information Technology