Which of the following networking protocols is used to give the remote computer secure command line access to the server?

A. SSH
B. Telnet
C. ICMP
D. RTP

Answer: A. SSH

Computer Science & Information Technology

You might also like to view...

A process control block (PCB) typically includes which of the following information?

a) the process’s execution context b) the process state c) the process identification number (PID) d) all of the above

Computer Science & Information Technology

Specify the order of operations in which the following formula would be calculated:=(4+7)+3^2*5-2

A. (4+7) B. 3^2 C. *5 D. +3 E. -2

Computer Science & Information Technology