Which of the following networking protocols is used to give the remote computer secure command line access to the server?
A. SSH
B. Telnet
C. ICMP
D. RTP
Answer: A. SSH
You might also like to view...
Keyboards that display on screen when input of text is required are known as virtual keyboards
Indicate whether the statement is true or false
In hacking activities, one computer provides the ________ for the criminal activity, while another serves as the target
Fill in the blank(s) with the appropriate word(s).
An instant message conversation consists of text exchanges called a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
Answer the following statements true (T) or false (F)
1. A user program executes in a kernel mode in which certain areas of memory are protected from the user’s use and certain instructions may not be executed. 2. Any program that is owned by, and SetUID to, the “superuser” potentially grants unrestricted access to the system to any user executing that program. 3. Traditional RBAC systems define the access rights of individual users and groups of users. 4. A constraint is a defined relationship among roles or a condition related to roles. 5. An ABAC model can define authorizations that express conditions on properties of both the resource and the subject.