What is the best way to secure Telnet?

A. Scrub all user input to make sure no invalid characters are passed in the Telnet statement
B. Do not use Telnet at all.
C. Use anonymous Telnet.
D. Use strong passwords that never change.

Answer: B

Computer Science & Information Technology

You might also like to view...

_________ locality is generally exploited by using larger cache blocks and by fetching items of anticipated use into the cache control logic.

A. Associative B. Physical C. Spatial D. Prefetching

Computer Science & Information Technology

Case WD 7-1Meredith is the administrative assistant at a large auto dealership. It is time to send out sales letters to customers who have purchased vehicles at the dealership. Meredith wants to include the customer's address in the letter as well as use his or her name within the letter. Which command inserts a Name field?

A. Address Block B. Insert Merge Field C. Greeting Line D. Select Recipients

Computer Science & Information Technology