Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?