The protocol that should be used for establishing a secure network connection is SSH.
The following information is to be considered:
- SFTP is secure also it is a protocol for file transferring that applied SSH.
- IP, FTP, and DHCP should not be for safety purposes as they are not secure.
- SSH is a secured connection for the remote sites so here the SSH protocol should be used.
Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.
Answer:
The correct answer to the following question will be Option B (Policy).
Explanation:
- The Policy is a systematic set of rules for driving policies and obtaining rational results. It is a declaration of intent and is applied as a process or protocol.
- Policies are usually implemented by the governing body throughout the corporation.
- It was the feature of Information assurance management, which sought to dictate those activities throughout the organization via a collection of institutional requirements.
Therefore, Option B is the right answer.
Answer:
phones = {'John': '1234567', 'Julie' : '7777777'}
Explanation:
In the code given in the question phones dictionary contains contains two keys John and Julie and have the values '5555555' and '7777777' respectively. Now in the code the key John in the dictionary phones is assigned the value '1234567' .So the value corresponding to the key John becomes '1234567'.