Which of the following protocols is used to securely connect to a multi-layer switch?

A. HTTP
B. SMTP
C. SSH
D. Telnet

Answer: C. SSH

Computer Science & Information Technology

You might also like to view...

Discuss one type of asset that an organization might have.

What will be an ideal response?

Computer Science & Information Technology

Which of the following statements is false?

a. Python does not have a built-in stack type, but you can think of a stack as a constrained list. b. You push using list method append, which adds a new element to the end of the list. c. You pop using list method pop with no arguments, which removes and re-turns the item at the front of the list. d. You can run out of memory if you keep pushing items faster than you pop them.

Computer Science & Information Technology