A company was recently audited by a third party. The audit revealed the company’s network devices were transferring files in the clear. Which of the following protocols should the company use to transfer files?

A. HTTPS
B. LDAPS
C. SCP
D. SNMPv3

Answer: C. SCP

Computer Science & Information Technology

You might also like to view...

What are the different levels at which a path can be selected?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is applied to network devices to ensure security vulnerabilities are minimized?

A) Antimalware software B) Registry edits C) Firewall software D) Firmware updates

Computer Science & Information Technology