Which of the following protocols has similar functionality to Telnet but operates more securely than Telnet?
A. TFTP
B. SSH
C. SNAT
D. RSH
Answer: B. SSH
Computer Science & Information Technology
You might also like to view...
A letter detected during numeric input __________.
a. is ignored b. terminates the reading of the current numeric input value c. causes the program to skip to the next line of coded d. causes the program to skip to the next line of data e. causes the program to crash
Computer Science & Information Technology
?When IT department costs are not charged to other departments, the information systems department is called a(n) _________ because it generates accounting charges with no offsetting credits for IT services.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology