C. SSH (Secure Shell) is indeed the only protocol among the listed options that inherently provides secure transmission of data. It encrypts the data transmitted between the client and server, which ensures confidentiality, integrity, and authenticity.
ecure Shell (SSH) is a good example of an end-to-end encryption technique. This suite of programs provides encrypted alternatives to common internet applications such as the File Transfer Protocol (FTP), Telnet, and rlogin. There are actually two versions of SSH. SSH1 (which is now considered insecure) supports the Data Encryption Standard (DES), Triple DES (3DES), International Data Encryption Algorithm (IDEA), and Blowfish algorithms. SSH2 drops support for DES and IDEA but adds several security enhancements, including support for the Diffie–Hellman key exchange protocol and the ability to run multiple sessions over a single SSH connection. SSH2 provides added protection against man-in-the-middle (on-path) attacks, eavesdropping, and IP/DNS spoofing.
C. Setup a server on Transmission Control Protocol (TCP) port 22. The Secure Shell (SSH) protocol, which is used for secure remote login and other secure network services, uses TCP port 22 as its default port. It is a common choice for securely exchanging data between organizations over the Internet.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Skittle4710
5 months, 2 weeks agoklarak
7 months, 1 week agogjimenezf
10 months, 1 week agoJohn520
1 year, 7 months agojackdryan
1 year, 6 months agoDJOEK
1 year, 10 months agoJamati
2 years agofranbarpro
2 years, 1 month ago