Which of the following tools can she use to protect the link?

Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried
that adversaries might be monitoring the communication link and could inspect captured traffic.
She would like to tunnel the information to the remote end but does not have VPN capabilities to
do so. Which of the following tools can she use to protect the link?

Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried
that adversaries might be monitoring the communication link and could inspect captured traffic.
She would like to tunnel the information to the remote end but does not have VPN capabilities to
do so. Which of the following tools can she use to protect the link?

A.
MD5

B.
PGP

C.
RSA

D.
SSH



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Ghost Man

Ghost Man

B is the Ans.