Which of the following protocols can be used to perform configuration management on a remote server using
the MOST secure methods? (Select TWO).
A.
SMTP
B.
DHCP
C.
RDP
D.
SSH
E.
TELNET
F.
DNS
Which of the following protocols can be used to perform configuration management on a remote server using
the MOST secure methods? (Select TWO).
Which of the following protocols can be used to perform configuration management on a remote server using
the MOST secure methods? (Select TWO).
A.
SMTP
B.
DHCP
C.
RDP
D.
SSH
E.
TELNET
F.
DNS