Which of the following is a protocol and command interface that can be use to gain secure access to
liti
Which of the following is a protocol and command interface that can be use to gain secure access to a remote computer and then execute commands to administer the system?