The protocol that should be used for establishing a secure network connection is SSH.  
The following information is to be considered:  
- SFTP is secure also it is a protocol for file transferring that applied SSH.
 - IP, FTP, and DHCP should not be for safety purposes as they are not secure.
 - SSH is a secured connection for the remote sites so here the SSH protocol should be used.
 
Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.
 
        
             
        
        
        
Answer:
The option(B) is the correct answer .
Explanation:
In C++  the // (two slash marks ) indicating the beginning of a comment .The two slash marks ( // ) comment the single line in a program.To use two slash marks ( // ) comment we simply write  // in which line we have to make comment. 
 following are the example of code in c++ 
#include<iostream.h> // header file
void main() // main method
{
cout<< " india"; // print india 
}
 here // indicating the beginning of a comment .
 
        
             
        
        
        
Answer:
the answer is going to be printer
 
        
             
        
        
        
Security/Insider threats.
As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.
Cyber-attacks.
Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.