which of the following does SSH provide protection?

Against which of the following does SSH provide protection?
Each correct answer represents a complete solution. Choose two.

Against which of the following does SSH provide protection?
Each correct answer represents a complete solution. Choose two.

A.
IP spoofing

B.
Broadcast storm

C.
Password sniffing

D.
DoS attack

Explanation:
Secure Shell (SSH) is a protocol that provides strong authentication and secure communications over
unsecured channels. It uses public key encryption as the main method for user authentication. SSH
secures connections over the Internet by encrypting passwords and other data.
It also protects networks against IP spoofing, packet spoofing, password sniffing, and eavesdropping.
SSH uses TCP port 22 as the default port and operates at the application layer.
SSH protocol has the following three components:
1.Transport layer protocol
2.User authentication protocol
3.Connection protocol
Answer option B is incorrect. A broadcast storm is a situation in which one or more network devices
send jabber packets constantly and create traffic on the network. Broadcast storms occur due to a
faulty network interface card (NIC) on the computer. The faulty NIC can be detected either by using
the Network Monitor software or by the elimination process.
Answer option D is incorrect. A Denial-of-Service (DoS) attack is mounted with the objective of
causing a negative impact on the performance of a computer or network. It is also known as network
saturation attack or bandwidth consumption attack. Attackers make Denial-of-Service attacks by
sending a large number of protocol packets to a network.
TechNet, Contents: “Ask Us About… Security, September 2000”



Leave a Reply 0

Your email address will not be published. Required fields are marked *