Which of the following networking protocols is used to give the remote computer secure command line access to the server?
A. SSH
B. Telnet
C. ICMP
D. RTP
Answer: A. SSH
Computer Science & Information Technology
You might also like to view...
A process control block (PCB) typically includes which of the following information?
a) the process’s execution context b) the process state c) the process identification number (PID) d) all of the above
Computer Science & Information Technology
Specify the order of operations in which the following formula would be calculated:=(4+7)+3^2*5-2
A. (4+7) B. 3^2 C. *5 D. +3 E. -2
Computer Science & Information Technology