A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without enc
ryption. Which of the following should the technician use to secure the connection?
A. SSH in tunnel mode
B. RDP set to console connection