After successfully authenticating to a remote server, a server administrator is presented with an interactive command line with no graphical interface. Which of the following protocols did the adm
inistrator MOST likely use to securely connect to the remote server?
A. SSH
B. Bash
C. Telnet
D. FTP