Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?

Which
of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2
protocol? Each correct answer represents a complete solution. Choose all that apply.

Which
of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2
protocol? Each correct answer represents a complete solution. Choose all that apply.

A.
TIS authentication

B.
Rhosts (rsh-style) authentication

C.
Kerberos authentication

D.
Password-based authentication

Explanation:
The Rhosts (rsh-style), TIS, and Kerberos user authentication methods are supported by
the SSH-1 protocol but not by SSH-2 protocol.
Answer option D is incorrect. Password-based authentication is supported by both the SSH-1 and
SSH-2 protocols.



Leave a Reply 0

Your email address will not be published. Required fields are marked *