answersLogoWhite

0

What else can I help you with?

Related Questions

SSH can be used to forward which otherwise insecure protocol?

It can be used for a lot of protocols, including Telnet and VNC.


IF Telnet protocol encrypts transmitted data which therefore cannot be read by others on the network?

Telnet does not encrypt anything; that is why it is too insecure to use as a network protocol.


What should be used as a replacement for telnet for secure remote login over an insecure network?

ssh protocol


Why would an administrator use the Telnet application when troubleshooting a network?

Telnet can be used to get into certain routers and other devices in the network. This will aid in the troubleshooting process because the devices support that protocol but it should be noted that it is a very insecure protocol and should never be used from outside the network to the inside of the network.


What is a terminal emulation protocol used to log on to remote hosts using the TCPIP protocol suite?

Telnet


Can you login as root using telnet?

Yes, you can, but this is a very dangerous thing to do. Firstly, telnet is an insecure protocol, and anyone with a packet sniffer can find out your root password. Secondly, one should really never log in as the root account; use su or sudo after logging in as an ordinary user using a more secure protocol such as ssh. There are some settings in some versions of telnet that may prevent root logins, but the standard telnet will allow that.


Which protocol is used for remote log in?

Telnet


Which protocol lacks support for encryption and can be initiated from a computer command prompt?

i think is Telnet


How is the application layer protocol telnet similar to http and ftp?

Telnet is similar to HTTP and FTP in that all three use the TCP protocol for connection-oriented


What is transferred between computers using telnet?

Telnet is a protocol for transferring plain text over TCP .


What protocol is meant to be a secure alternative to Telnet?

ssh


Which protocol lacks support for encryption and can be initiated from a computer co?

telnet..