1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
14

Marge needs to collect network device configuration information and network statistics from devices on the network. She wants to

protect the confidentiality of credentials used to connect to these devices. Which of the following protocols would BEST meet this need?
a. SSH
b. FTPS
c. SNMPv3
d. TLS
Computers and Technology
1 answer:
garri49 [273]3 years ago
4 0

Answer:

Option C i.e., SNMPv3.

Explanation:

She requires to gather data about setup for connected devices and network data through equipments on the server. She wanted to maintain the privacy of passwords that are required to communicate with such devices. So, they need could be met by the SNMPv3 protocols.

It is a reliable protocol, capable of tracking and collecting data through connected devices. This provides robust processes for authenticating credentials that preserve their confidentiality. That's why no other mentioned protocols can be used to track devices in the network.

You might be interested in
Difference between batabse and database management system
adelina 88 [10]

Answer:A database is an organized collection of structured information, or data, typically stored electronically in a computer system. A database is usually controlled by a database management system (DBMS). ... The data can then be easily accessed, managed, modified, updated, controlled, and organized.

Explanation:A database could be grades that students get at school and to manage it we can use a spreadsheet program like excel

4 0
3 years ago
I need Help Right now!!!!!!!!!!!!!!!!!!!!!!!!!
Vikki [24]
Analog<span> and </span>digital<span> signals are used to transmit information, usually through electric signals. In both these technologies, the information, such as any audio or video, is transformed into electric signals. The </span>difference between analog and digital<span> technologies is that in analog technology, information is translated into electric pulses of varying amplitude. In digital technology, translation of information is into binary format (zero or one) where each bit is representative of two distinct amplitudes. analog vs digital</span>
5 0
4 years ago
Unlike clip art, you cannot resize a photograph using the mouse. <br> a. True<br> b. False
masya89 [10]
<span>b. false; unlike clip art, you cannot resize a photograph

</span>
7 0
3 years ago
Question 3 : what tool can diagnose and fix many common linux filesystem problems?
vaieri [72.5K]
The t<span>ool that can diagnose and fix many common linux file system problems is </span>fsck.  fsck, is Linux's file system check utility. It's similar in purpose to the DOS and Windows CHKDSK and ScanDisk utilities. 
3 0
3 years ago
Is a collection of computers and other devices that are connected in order to enable users to share hardware, software, and data
antoniya [11.8K]
That would be a Network.
8 0
4 years ago
Other questions:
  • Write a static method named textcount that takes a scanner representing a file as a parameter and that reports various statistic
    11·1 answer
  • Is Windows a:<br><br> A.operating system<br> B.software<br> C.hardware<br> D.input device
    12·1 answer
  • Write a SELECT statement that returns two columns: vendor_id and the largest unpaid invoice for each vendor. To do this, you can
    6·1 answer
  • What tool do you use to secure remote access by users who utilize the internet??
    7·1 answer
  • What refers to the protocolâ s ability to ensure that data hasnâ t been modified in any way?
    15·1 answer
  • When choosing a new computer to buy, you need to be aware of what operating it uses.
    12·1 answer
  • Suppose two hosts, A and B, are connected by a 10 Mbps link. The length of a packet is 12 Kb (Kilobits, i.e., 12 × 103 bits). Th
    15·1 answer
  • It is ok to sell services on Xbox in exchange for real-world money
    10·2 answers
  • Which of the following is similar to defense in depth and supports multiple layers of security?a. Defense in depthb. Diversity o
    7·1 answer
  • Write the code (from to )using for loop andif elseif statementto accept themobile phone numbersof200 residents of Dubaiasstringa
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!