Computer-Networks
August 30, 2024
Computer-Networks
August 30, 2024
Computer-Networks
August 30, 2024
Computer-Networks
August 30, 2024

Computer-Networks

Question 434
Which of the following statements about Secure Shell Protocol (SSH) is FALSE?
A
SSH cannot be used for file transfer and e-mail tasks.
B
SSH provides a secure client/server communication.
C
SSH runs on top of the TCP/IP layer.
D
SSH is a network protocol.
Question 434 Explanation: 
→Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
→ Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH.
Correct Answer: A
Question 434 Explanation: 
→Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
→ Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH.

Leave a Reply

Your email address will not be published. Required fields are marked *