Names and Definitions Flashcards
1
Q
A
2
Q
A
3
Q
A
4
Q
A
5
Q
A
6
Q
A
7
Q
A
8
Q
A
9
Q
A
10
Q
A
11
Q
A
12
Q
A
13
Q
A
14
Q
A
15
Q
A
16
Q
A
17
Q
A
18
Q
A
19
Q
A
20
Q
A
21
Q
A
22
Q
A
Telnet is inherently insecure. Credential information (usernames and passwords) submitted through telnet is not encrypted and is therefore vulnerable to identity theft. However, users can establish a Secure Shell connection instead to prevent this type of intrusion. A Secure Shell connection is used to log onto a remote machine over a network, to execute commands on a remote machine and to transfer file from one machine to another. Secure Shell replaces telnet, rlogin, rsh, and rcp
23
Q
A
24
Q
A
25
Q
A
26
Q
A
27
Q
A
28
Q
A
29
Q
A
30
Q
A
31
Q
A
32
Q
A