nerdexam
(ISC)2(ISC)2

CISSP · Question #696

CISSP Question #696: Real Exam Question with Answer & Explanation

The correct answer is A: Secure Shell (SSH). Secure Shell (SSH) is the most secure protocol for remote command access to devices like firewalls. SSH provides strong encryption and ensures secure communication over an insecure network, such as the internet. It is commonly used to remotely manage and configure network devices

Submitted by jaden.t· Mar 5, 2026Communication and Network Security

Question

Which of the following is the MOST secure protocol for zremote command access to the firewall?

Options

  • ASecure Shell (SSH)
  • BTrivial File Transfer Protocol (TFTP)
  • CHypertext Transfer Protocol Secure (HTTPS)
  • DSimple Network Management Protocol (SNMP) v1

Explanation

Secure Shell (SSH) is the most secure protocol for remote command access to devices like firewalls. SSH provides strong encryption and ensures secure communication over an insecure network, such as the internet. It is commonly used to remotely manage and configure network devices, including firewalls, without exposing sensitive information like login credentials in plain SSH uses strong encryption to protect the integrity and confidentiality of the data transmitted between the client and the server, making it highly secure for remote administration. SSH also provides authentication mechanisms (such as password-based or key-based authentication), which further enhance its security.

Topics

#secure protocols#SSH#remote administration#network security

Community Discussion

No community discussion yet for this question.

Full CISSP PracticeBrowse All CISSP Questions