How should a system administrator securely access an interactive shell account via the network"?
A. remsh
B. ssh
C. ftp
D. telnet
How should a system administrator securely access an interactive shell account via the network"?
A. remsh
B. ssh
C. ftp
D. telnet