kane was transferring files from a file transfer protocol (ftp) server to his local machine simultaneously. he sniffed the traffic to find that only the control port commands are encrypted, and the data port is not encrypted. what protocol did kane use to transfer the files?