An administrator has been asked to remotely configure a guest machine while on vacation. The administrator only has access to a hotel kiosk to make the necessary changes. Which of the following can be used to securely meet this request?
A.
SCP
B.
HTTPS
C.
FTP
D.
IPMI
B.