nerdexam
(ISC)2(ISC)2

CISSP-ISSMP · Question #40

CISSP-ISSMP Question #40: Real Exam Question with Answer & Explanation

The correct answer is A: IP spoofing. Secure Shell (SSH) is a protocol that provides strong authentication and secure communications over unsecured channels. It uses public key encryption as the main method for user authentication. SSH secures connections over the Internet by encrypting passwords and other data. It a

Foundational Security Concepts

Question

Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.

Options

  • AIP spoofing
  • BBroadcast storm
  • CPassword sniffing
  • DDoS attack

Explanation

Secure Shell (SSH) is a protocol that provides strong authentication and secure communications over unsecured channels. It uses public key encryption as the main method for user authentication. SSH secures connections over the Internet by encrypting passwords and other data. It also protects networks against IP spoofing, packet spoofing, password sniffing, and eavesdropping. SSH uses TCP port 22 as the default port and operates at the application layer. SSH protocol has the following three components: 1.Transport layer protocol 2.User authentication protocol 3.Connection protocol Answer option B is incorrect. A broadcast storm is a situation in which one or more network devices send jabber packets constantly and create traffic on the network. Broadcast storms occur due to a faulty network interface card (NIC) on the computer. The faulty NIC can be detected either by using the Network Monitor software or by the elimination process. Answer option D is incorrect. A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers make Denial-of-Service attacks by sending a large number of protocol packets to a network.

Topics

#SSH#Encryption#Network Security#Authentication

Community Discussion

No community discussion yet for this question.

Full CISSP-ISSMP PracticeBrowse All CISSP-ISSMP Questions