When attempting to send a file to another user securely with GPG, which of the following actions must be done?
Which of the following tools might a security analyst use to determine services that are running on the server, without logging into the machine?