Which of the following connection methods is considered secure?

A. HTTP
B. RCP
C. HTTPS
D. TELNET

Answer: C. HTTPS

Computer Science & Information Technology

You might also like to view...

______ is a field of study in which information technology is applied to the field of biology

a.Bioinformatics b.Distributed computing c.Ergonomics d.Ubicomp

Computer Science & Information Technology

Which of the following is a security feature that can help prevent damage to your computer from viruses and other malware by monitoring your programs to make sure they are using memory safely?

A) DEP B) NTFS C) Task Scheduler D) Windows Defender

Computer Science & Information Technology