You are a network administrator and you need to access the secure command line interface access of an edge router on your network. The router uses cryptography for remote authentication. Which protocol is the router configured with for this purpose?
Telnet
HTTPS
RDP
SSH
SSH
Computer Science & Information Technology
You might also like to view...
The ________ button allows you to add additional options to the Quick Access Toolbar
A) More B) Arrow C) General D) Customize
Computer Science & Information Technology
A(n) ________ network uses radio waves as its transmission medium
Fill in the blank(s) with correct word
Computer Science & Information Technology
You should NOT run a defragmenter on a solid-state disk (SSD)
Indicate whether the statement is true or false
Computer Science & Information Technology
An ordered list is used for:
a. Step-by-step instructions. b. An outline of a larger document. c. Marking up breadcrumb navigation. d. All of the above. e. None of the above.
Computer Science & Information Technology