The protocol that should be used for establishing a secure network connection is SSH.
The following information is to be considered:
- SFTP is secure also it is a protocol for file transferring that applied SSH.
- IP, FTP, and DHCP should not be for safety purposes as they are not secure.
- SSH is a secured connection for the remote sites so here the SSH protocol should be used.
Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.
Based on the scenario above about the leading-trailing system Both technician A and B are incorrect.
<h3>How many brake shoes function?</h3>
There are known to be two shoes function that are said to be working a way where both become either the trailing shoe or leading shoe based on whether the vehicle is moving forward or backward.
Therefore we can say that, Based on the scenario above about the leading-trailing system Both technician A and B are incorrect.
Learn more about trailing system from
brainly.com/question/14367881
#SPJ1
Answer: data security
Explanation:
The company's authentication protocols and data encryption measures denotes data security.
Data security simply means protecting unauthorized people from having access to a particular data. This is done to prevent unauthorized access of important information or to prevent fraud. Some of the data security measures include data encryption, tokenization, hashing, etc.