Fred needs to transfer files between two servers on an untrusted network. Since he knows the network isn't trusted, he needs to select an encrypted protocol that can ensure that his data remains secure. What protocol should he choose?

A. SSH
B. TCP
C. SFTP
D. IPsec


Answer: C. SFTP

Computer Science & Information Technology

You might also like to view...

Object-oriented ____________________ provides a more elegant solution for handling error conditions than in previous procedural approaches.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The statements in a do...while statement always execute repeatedly before the conditional expression evaluates the count variable.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

With a solid understanding of the requirements document, an understanding of the necessary decisions, and a sketch of the worksheet, the next step is to _____.

A. use Excel to create the worksheet B. design the 3-D Pie chart C. perform calculations D. create the 3-D Pie chart

Computer Science & Information Technology

AIR (Adobe Integrated Runtime) is a(n) ________.

A. type of technology B. application C. plug-in D. file format

Computer Science & Information Technology