A security administrator has written a script that will automatically upload binary and text-based configuration files onto a remote server using a scheduled task. The configuration files contain sensitive information. Which of the following should the administrator use? (Select TWO) The answer choices are below, can you also provide an explanation?
A. TOPT
B. SCP
C. FTP over a non-standard port
D. SRTP
E. Certificate-based authentication
F. SNMPv3