COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which one is most vulnerable from the list below?
A
SSH
B
SecureVPN
C
HTTPS
D
Telnet
Explanation: 

Detailed explanation-1: -Publicly available Telnet service can leave your clients vulnerable to data leaks of information like usernames and passwords. Because Telnet is one of the earliest remote login protocols on the Internet, initially released in 1969, it provides no built-in security measures and suffers from serious security issues.

Detailed explanation-2: -Why is it a risk? When telnet is used over an unencrypted channel (like the Internet), things like usernames and passwords are transferred in clear text. This allows an attacker to eavesdrop on connections and discover confidential information.

Detailed explanation-3: -SSH is more secure, so it uses public key encryption for authentication. Due to its less security provisions, Telnet is recommended only for private networks. SSH is suitable for Public networks.

Detailed explanation-4: -Telnet Is Insecure All of the text sent between computers using Telnet is in plain text. This includes usernames and passwords as well.

There is 1 question to complete.