You are a network administrator and you need to access the secure command line interface access of an edge router on your network. The router uses cryptography for remote authentication. Which protocol is the router configured with for this purpose?

Telnet

HTTPS

RDP

SSH


SSH

Computer Science & Information Technology

You might also like to view...

The ________ button allows you to add additional options to the Quick Access Toolbar

A) More B) Arrow C) General D) Customize

Computer Science & Information Technology

A(n) ________ network uses radio waves as its transmission medium

Fill in the blank(s) with correct word

Computer Science & Information Technology

You should NOT run a defragmenter on a solid-state disk (SSD)

Indicate whether the statement is true or false

Computer Science & Information Technology

An ordered list is used for:

a. Step-by-step instructions. b. An outline of a larger document. c. Marking up breadcrumb navigation. d. All of the above. e. None of the above.

Computer Science & Information Technology