Which of the following protocols is used to securely connect to a multi-layer switch?
A. HTTP
B. SMTP
C. SSH
D. Telnet
Answer: C. SSH
Computer Science & Information Technology
You might also like to view...
Discuss one type of asset that an organization might have.
What will be an ideal response?
Computer Science & Information Technology
Which of the following statements is false?
a. Python does not have a built-in stack type, but you can think of a stack as a constrained list. b. You push using list method append, which adds a new element to the end of the list. c. You pop using list method pop with no arguments, which removes and re-turns the item at the front of the list. d. You can run out of memory if you keep pushing items faster than you pop them.
Computer Science & Information Technology