Which of the following protocols should be used to access and manage the system?