Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried
that adversaries might be monitoring the communication link and could inspect captured traffic.
She would like to tunnel the information to the remote end but does not have VPN capabilities to
do so. Which of the following tools can she use to protect the link?
A.
MD5
B.
PGP
C.
RSA
D.
SSH