Which of the following connection methods is considered secure?
A. HTTP
B. RCP
C. HTTPS
D. TELNET
Answer: C. HTTPS
Computer Science & Information Technology
You might also like to view...
______ is a field of study in which information technology is applied to the field of biology
a.Bioinformatics b.Distributed computing c.Ergonomics d.Ubicomp
Computer Science & Information Technology
Which of the following is a security feature that can help prevent damage to your computer from viruses and other malware by monitoring your programs to make sure they are using memory safely?
A) DEP B) NTFS C) Task Scheduler D) Windows Defender
Computer Science & Information Technology