Which of the following is a protocol and command interface that can be use to gain secure access to a remote computer and then execute commands to administer the system?
Which fact must network administrators consider when implementing encryption policies for company data that will be sent internationally?