1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zanzabum
1 year ago
8

your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do

you use
Computers and Technology
1 answer:
Ivan1 year ago
8 0

The protocol that should be used to establish a secure network connection for backups is SSH.

<h3>Secure Shell</h3>

SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.

SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:

  • Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
  • SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
  • Perform automatic and secure file transfers.
  • Launch commands securely on remote devices or systems.
  • Perform secure component management of network infrastructure.

Learn more about Secure network connection: brainly.com/question/28083478

#SPJ4

You might be interested in
A checklist can be useful by helping A. organize information B. separate information C. portray information clearly D. all of th
Tema [17]
It's D because a checklist is to help you organize a list of things like groceries, homework etc. It can sperate indormation..for example, homework need to be separated so we won't messed up on which is which. It can also portray information clearly because you're making a check list.
3 0
3 years ago
QUESTION 11
tino4ka555 [31]

Answer:

x == 32

Explanation:

CODE in Java:

       int x = 32;

       if(x == 32){

           System.out.println("Pass");

       }

       else{

           System.out.println("Fail");

       }

OUTPUT:

Pass

8 0
2 years ago
You open a folder by double-clicking on it with your mouse. True False
allsm [11]
Depends if it's not working the first time then u click it twice but normally you click it once
5 0
3 years ago
Read 2 more answers
For the block of 400 addresses, what is the length of the net id? njit
rewona [7]
23 bits would leave room for 512 node numbers.
3 0
3 years ago
How does human error relate to security risks
oksian1 [2.3K]

Answer:

The error could let people through who really shouldn't be through

8 0
3 years ago
Other questions:
  • What precaution can you take while using a social networking site to prevent a data breach?
    15·1 answer
  • A power supply unit for a computer converts:
    7·1 answer
  • (Please answer! Correct answer gets brainliest!)
    5·2 answers
  • Which of the following is not considered format?
    8·2 answers
  • __________ is a growing practice in cooperative farmingassociations to pool and sell the fruit as a common commodity underthe br
    6·1 answer
  • A user reports network resources can no longer be accessed. The PC reports a link but will only accept static IP addresses. The
    6·1 answer
  • What is the best programming language
    9·1 answer
  • How do you access the <br><br>internet in your school and at home?​
    11·1 answer
  • Give one (1) advantage and one(1) disadvantage of using and integrated software package over a custom written one.
    15·1 answer
  • What are good reasons to do yearly disaster recovery testing? check all that apply
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!