The protocol that should be used for establishing a secure network connection is SSH.
The following information is to be considered:
- SFTP is secure also it is a protocol for file transferring that applied SSH.
- IP, FTP, and DHCP should not be for safety purposes as they are not secure.
- SSH is a secured connection for the remote sites so here the SSH protocol should be used.
Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.
Answer:
D
Explanation:
All three of A, B and C are required to harden a host. Thus, All of the above makes the best option.
Hardening simply refers to making your data impossible to be penetrated. More like bulletproof.
To do this, ensure measures like
- Regular Program cleanup
- Patches management
- service pack installation
- service or usage policies
...among others.
Cheers
Answer:
=Tight coupling between components, as everything is in one application.
=Less reusability.
=Large code base; tough for developers and QA to understand the code and business knowledge.
=Less Scalable.
=Does not follow SRP (Single Responsibility Principle)
=More deployment and restart times.
Answer:
(9F7, 9F8, 9F9, 9FA, 9FB, 9FC, 9FD, 9FE, 9FF, A00, A01, A02, A03)
Explanation:


This means that we must find all hexadecimal values from 2551 to 2563, or 9F7 to A03. You can convert from decimal to hexadecimal for each one, or just count.
Answer:
event based and time based
Explanation:
OTP tokens come in two types: event-based (HOTP) and time-based (TOTP). Event-based OTP tokens generate new codes at the press of the button and the code is valid until it is used by the application. Time-based OTP tokens generate codes that are valid only for a certain amount of time (eg, 30 or 60 seconds), after which a new code must be generated