1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karo-lina-s [1.5K]
4 years ago
10

Which two protocols can be used to gain remote access specifically to a server's command line interface, securely and unsecurely

?
Computers and Technology
1 answer:
padilas [110]4 years ago
7 0
Telnet and SSH are two protocols that can be used to gain remote access specifically to a server's command line interface.
You might be interested in
HELP ASAP WILL GIVE BRAINLY Question 19 Multiple Choice Worth 5 points) (05 03 MC) Network technologies specialist Hannah has be
nasty-shy [4]

Network technologies specialist Hannah would need to configure: C. RIP version 2 using Internet Protocol Version 4 (TCP/IPv4).

<h3>What is RIP?</h3>

RIP is an acronym for Routing Information Protocol and it can be defined as an intradomain routing protocol which is typically designed and developed based on distance vector routing.

<h3>The types of RIP.</h3>

In Computer networking, there are two main types of Routing Information Protocol (RIP) and these include:

  • RIP version 1.
  • RIP version 2.

RIP version 2 are generally designed and developed to include subnet masks unlike RIP version 1. Thus, Hannah would need to configure RIP version 2 using Internet Protocol Version 4 (TCP/IPv4) allow several machines on different subnets to communicate with each other using broadcasts.

Read more on routing protocol here: brainly.com/question/24812743

4 0
3 years ago
Terrence smiles at his customers, helps his cowokers,and stays late when needed. What personal skill does Terrence demonstrate
adell [148]

Answer: Humility,kindness

Explanation:

5 0
3 years ago
Read 2 more answers
If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role shou
Darya [45]

Answer:

Delegate

Explanation:

8 0
3 years ago
Insurance can help you:a. minimize monthly expenses
KIM [24]
This is an easy answer sure in the back of your mind u knew it was b good luck :).

4 0
3 years ago
Write three uses and applications of computer, people that use it,and use of computer in those areas.​
Kruka [31]

Answer:

Medical Field.

Entertainment.

Industry.

Education.

Government.

Banking.

Business.

6 0
3 years ago
Other questions:
  • Explain how to implement two stacks in one array A[1..n] in such a way that neither stack overflows unless the total number elem
    7·1 answer
  • This is not for school but how do I mark am answer brainliest?
    15·1 answer
  • Find all three-digit numbers with non-zero first digit that are equal to the sum of the cubes of their digits.
    8·1 answer
  • printArray is a function that has two parameters. The first parameter is an array of element type int and the second is an int,
    10·1 answer
  • Review the section from your textbook related to management information systems (MIS) infrastructures. Determine where each item
    13·1 answer
  • Complete the function doubling_time that takes two parameters bal and apr and uses a while loop compute the number of years it t
    10·1 answer
  • The difference between the Basic Image Editing Software and Advance Image Editing Software.
    14·1 answer
  • Final one bit l y links are a virus that will corrupt your files do not go on it
    15·2 answers
  • Give two differences between ergonomic keyboard and standard keyboard?​
    9·1 answer
  • Write a program in c# that simulates the roll of two six sided dice.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!