After successfully authenticating to a remote server, a server administrator is presented with an interactive
command line with no graphical interface. Which of the following protocols did the administrator MOST likely
use to securely connect to the remote server?
A.
SSH
B.
Bash
C.
Telnet
D.
FTP