After successfully authenticating to a remote server, a server administrator is presented with an interactive command line with no graphical interface. Which of the following protocols did the administrator MOST likely use to securely connect to the remote server?

A. SSH
B. Bash
C. Telnet
D. FTP

Answer: A. SSH

Computer Science & Information Technology

You might also like to view...

To navigate a table, you can use the keyboard shortcut ________ to move right to left

Fill in the blank(s) with correct word

Computer Science & Information Technology

When there are multiple types of data that you want to chart, you should use a ________ chart

A) pie B) dual axis C) column D) bar

Computer Science & Information Technology