Which of the following protocols can be used to perform configuration management on a remote server using the MOST secure methods? (Select TWO).