nerdexam
(ISC)2(ISC)2

CISSP · Question #622

CISSP Question #622: Real Exam Question with Answer & Explanation

The correct answer is D: authentication, compression, confidentiality, and integrity.. SSH version 2 is a secure protocol that provides authentication, compression, confidentiality, and integrity for remote connections. Understanding its supported features is essential for network security certification exams.

Submitted by katya_ua· Mar 5, 2026Communication and Network Security

Question

The Secure Shell (SSH) version 2 protocol supports.

Options

  • Aavailability, accountability, compression, and integrity,
  • Bauthentication, availability, confidentiality, and integrity.
  • Caccountability, compression, confidentiality, and integrity.
  • Dauthentication, compression, confidentiality, and integrity.

Explanation

SSH version 2 is a secure protocol that provides authentication, compression, confidentiality, and integrity for remote connections. Understanding its supported features is essential for network security certification exams.

Common mistakes.

  • A. Availability is not a feature provided by the SSH protocol itself; SSH does not include mechanisms to ensure service uptime or redundancy, and 'accountability' is not a defined SSHv2 feature.
  • B. While authentication and integrity are correct SSHv2 features, 'availability' is not provided by SSH - SSH has no built-in mechanisms to guarantee service availability or uptime.
  • C. Accountability is not a feature of SSHv2; SSH does not natively provide audit logging or non-repudiation services, and 'availability' is also absent from SSHv2's defined capabilities.

Concept tested. SSH version 2 protocol supported security features

Reference. https://www.rfc-editor.org/rfc/rfc4251

Topics

#SSHv2#Confidentiality#Integrity#Authentication

Community Discussion

No community discussion yet for this question.

Full CISSP PracticeBrowse All CISSP Questions