Computer-Networks
August 30, 2024Computer-Networks
August 30, 2024Computer-Networks
|
Question 434
|
Which of the following statements about Secure Shell Protocol (SSH) is FALSE?
|
SSH cannot be used for file transfer and e-mail tasks.
|
|
|
SSH provides a secure client/server communication.
|
|
|
SSH runs on top of the TCP/IP layer.
|
|
|
SSH is a network protocol.
|
Question 434 Explanation:
→Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
→ Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH.
→ Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH.
Correct Answer: A
Question 434 Explanation:
→Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
→ Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH.
→ Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH.
