The rlogin protocol should no longer be used because:

a. SSH is more efficient
b. Its password encryption has been compromised
c. It cannot be routed on an IPv6 network
d. Credentials are passed in the clear


d. Credentials are passed in the clear

Computer Science & Information Technology

You might also like to view...

The Slide Master View button is located in the _____ group on the View tab.

A. Slide Show B. Presentation Views or Master Views C. Transitions or Animations D. Design

Computer Science & Information Technology

Using a work breakdown structure (WBS) allows one to manage a project as one large task.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To force a literal value to be treated as a specific data type, you must use a literal-type character designator.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

With a solid understanding of the requirements document, an understanding of the necessary decisions, and a sketch of the worksheet, the next step is to _____.

A. use Excel to create the worksheet B. design the 3-D Pie chart C. perform calculations D. create the 3-D Pie chart

Computer Science & Information Technology