A company was recently audited by a third party. The audit revealed the company’s network devices were transferring files in the clear. Which of the following protocols should the company use to transfer files?
A. HTTPS
B. LDAPS
C. SCP
D. SNMPv3
Answer: C. SCP
Computer Science & Information Technology
You might also like to view...
What are the different levels at which a path can be selected?
What will be an ideal response?
Computer Science & Information Technology
Which of the following is applied to network devices to ensure security vulnerabilities are minimized?
A) Antimalware software B) Registry edits C) Firewall software D) Firmware updates
Computer Science & Information Technology