Fred needs to transfer files between two servers on an untrusted network. Since he knows the network isn't trusted, he needs to select an encrypted protocol that can ensure that his data remains secure. What protocol should he choose?
A. SSH
B. TCP
C. SFTP
D. IPsec
Answer: C. SFTP
You might also like to view...
Object-oriented ____________________ provides a more elegant solution for handling error conditions than in previous procedural approaches.
Fill in the blank(s) with the appropriate word(s).
The statements in a do...while statement always execute repeatedly before the conditional expression evaluates the count variable.
Answer the following statement true (T) or false (F)
With a solid understanding of the requirements document, an understanding of the necessary decisions, and a sketch of the worksheet, the next step is to _____.
A. use Excel to create the worksheet B. design the 3-D Pie chart C. perform calculations D. create the 3-D Pie chart
AIR (Adobe Integrated Runtime) is a(n) ________.
A. type of technology B. application C. plug-in D. file format