well they should because without a job people cant live a good life and if they took that from them then they should compensate them at least.
"ICMP" <span>is used for supervisory messages at the internet protocol layer.
ICMP stands for </span>Internet Control Message Protocol and it refers to a supporting protocol in the Internet protocol suite. It is utilized by network devices which includes routers and these are used to send error messages and operational data showing, for instance, that asked for service which isn't accessible or that a host or switch couldn't be come to.
The protocol that should be used for establishing a secure network connection is SSH.
The following information is to be considered:
- SFTP is secure also it is a protocol for file transferring that applied SSH.
- IP, FTP, and DHCP should not be for safety purposes as they are not secure.
- SSH is a secured connection for the remote sites so here the SSH protocol should be used.
Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.
Answer:
In the ISO/IEC 27002 framework, Cryptography describes the use and controls related to encryption, to help an organization implement, maintain, and improve its information security management.