You want to set up a server so clients can transfer files from that server securely. Which of the following protocols could you use to accomplish this?
Attacks, Threats, and Vulnerabilities | |
Architecture and Design | |
Implementation | |
Operations and Incident Response | |
Governance, Risk, and Compliance |