Which of the following is the MOST secure access method?

A. RSH
B. SFTP
C. SNMPv1
D. RCP

Answer: B. SFTP

Computer Science & Information Technology

You might also like to view...

The starting vertex of a shortest path in a graph is called the ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Neither the Zoom tool nor the Hand tool affect the way a Flash graphic is displayed to the user.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology