Which of the following is a protocol and command interface that can be use to gain secure access to…
Which of the following is a protocol and command interface that can be use to gain secure access to a remote computer and then execute commands to administer the system?