Which protocol supports a secure connection to a remote host via terminal emulation software?

a. Telnet
b. SSH
c. FTP
d. SFTP


Answer: b. SSH

Computer Science & Information Technology

You might also like to view...

What will be the values of ans, x, and y after the following statements are executed?

``` int ans = 35, x = 50, y = 50; if (x >= y) { ans = x + 10; x -= y; } else { ans = y + 10; y += x; } ``` a. ans = 60, x = 0, y = 50 b. ans = 45, x = 50, y = 0 c. ans = 45, x = 50, y = 50 d. ans = 60, x = 50, y = 100

Computer Science & Information Technology

Who must be notified of Severity Level 3 incidents?

A) Chief Executive Officer B) Chief Operating Officer C) Chief Information Security Officer D) Legal counsel

Computer Science & Information Technology

The bounds property controls the ___________ .

a) size of the text b) location of a component c) size of a component d) Both b and c

Computer Science & Information Technology

The first three frames of a button are known as ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology