A cybersecurity analyst is setting up a secure method for administrators to remotely manage Linux servers. Which protocol should the analyst recommend to ensure data integrity and confidentiality?
Telnet
Secure Shell (SSH)
Remote Desktop Protocol (RDP)
Hypertext Transfer Protocol Secure (HTTPS)