latoriacruikshank latoriacruikshank
  • 01-10-2020
  • Computers and Technology
contestada

Which term means a cryptographic protocol used to manage network devices securely when they are used with a network that is not secure, such as when remotely accessing a computer?

Respuesta :

bananamuffin417 bananamuffin417
  • 05-10-2020

Answer: A- Secure shell (SSH)

Explanation:

Answer Link
elizahawkins123
elizahawkins123 elizahawkins123
  • 20-10-2020

Answer:

Secure Shell (SSH)

Explanation:

I just completed this activity.

Answer Link

Otras preguntas

Initial Knowledge CheckQuestion 19For the dinner special at a restaurant, the customer must choose an appetizer, a salad, an entree, a side dish, and a dessert.
a family walked 240 miles in 4 hours yesterday at this rate how many hours will it take to walk another 150 miles
The triangle has the sides AB = 4cm BC = 6cm AC = 8cmCalculate the triangles Area
Graph the equation by the translating y=|x|Y=|x+2|A. Graph a B. Graph c C. Graph d D. Graph b
In a running competition, a bronze, silver and gold medal must be given to the top three girls and top three boys. If 8 boys and 6 girls are competing, how many
Which kind of symmetry does the letter D have?A. point symmetry, onlyB. line symmetry, onlyC. neither point nor line symmetryD. both point and line symmetry
What did I do wrong? Need help with this equation
where can I find L1 and L4 ? for missing alternate angles
compare 5.7145... and [tex] \sqrt{29} [/tex]
The range of the following relation R {(3, -5), (1, 2), (-1,-4), (-1, 2)} is (1 point)O{-5, -4, 2}O {-1,-1, 1, 3}O {-4, -5, 2, 2}O {-1, 1, 3}