After successfully authenticating to a remote server, a server administrator is presented with an interactive command line with no graphical interface. Which of the following protocols did the administrator MOST likely use to securely connect to the remote server?
A. SSH
B. Bash
C. Telnet
D. FTP
Answer: A. SSH
Computer Science & Information Technology
You might also like to view...
To navigate a table, you can use the keyboard shortcut ________ to move right to left
Fill in the blank(s) with correct word
Computer Science & Information Technology
When there are multiple types of data that you want to chart, you should use a ________ chart
A) pie B) dual axis C) column D) bar
Computer Science & Information Technology