Question
Which protocol is most commonly used for securing remote
access to network devices?Solution
SSH provides a secure channel over an unsecured network for remote management of devices. Unlike Telnet, which transmits data in plaintext, SSH uses encryption to protect credentials and communication, ensuring confidentiality and integrity. SSH is widely used for securely managing servers, routers, and switches, offering authentication mechanisms and data encryption to prevent eavesdropping or attacks. ________________________________________ Why Other Options Are Incorrect? 1. Telnet: Lacks encryption, making it insecure for modern use. 2. FTP: Used for file transfers, not remote management. 3. SNMP: Designed for network monitoring, not direct device access. 4. ICMP: Used for diagnostics like ping, not device management.
The order of convergence of Newton-Raphson method is:
In public key cryptography ___
key is used for encryption and ____ key is used for decryption.
...What is the primary objective of the K-means clustering algorithm in data analysis?
Predict the output
list1 = ['physics', 'chemistry', 1997, 2000]
list2 = [1, 2, 3, 4, 5, 6, 7 ]
print "list1[0]: ", list1[0]
What does the Hamming distance measure in the context of information theory and coding?
Which SQL command is primarily used to retrieve records from a database table?
State True or False
Semi-structured data is data that does not conform to a data model but has some structure. It lacks a fixed or rigid sc...
Why does paging incur memory overhead in operating systems?
A software developer is designing a banking application where each bank account object should restrict direct access to its balance variable to prevent ...
What is the purpose of the #define directive in programming languages like C and C++?