CISSP-ISSMP · Question #40
CISSP-ISSMP Question #40: Real Exam Question with Answer & Explanation
The correct answer is A: IP spoofing. Secure Shell (SSH) is a protocol that provides strong authentication and secure communications over unsecured channels. It uses public key encryption as the main method for user authentication. SSH secures connections over the Internet by encrypting passwords and other data. It a
Question
Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.
Options
- AIP spoofing
- BBroadcast storm
- CPassword sniffing
- DDoS attack
Explanation
Secure Shell (SSH) is a protocol that provides strong authentication and secure communications over unsecured channels. It uses public key encryption as the main method for user authentication. SSH secures connections over the Internet by encrypting passwords and other data. It also protects networks against IP spoofing, packet spoofing, password sniffing, and eavesdropping. SSH uses TCP port 22 as the default port and operates at the application layer. SSH protocol has the following three components: 1.Transport layer protocol 2.User authentication protocol 3.Connection protocol Answer option B is incorrect. A broadcast storm is a situation in which one or more network devices send jabber packets constantly and create traffic on the network. Broadcast storms occur due to a faulty network interface card (NIC) on the computer. The faulty NIC can be detected either by using the Network Monitor software or by the elimination process. Answer option D is incorrect. A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers make Denial-of-Service attacks by sending a large number of protocol packets to a network.
Topics
Community Discussion
No community discussion yet for this question.