COMPUTER NETWORKING

NETWORK LAYER

UNICAST ROUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which protocol secures router management session traffic?
A
SSTP
B
POP
C
Telnet
D
SSH
Explanation: 

Detailed explanation-1: -SSH includes support for standard file transfer protocol (SFTP), a new standard file transfer protocol introduced in SSHv2. This feature provides a secure and authenticated method for copying router configuration or router image files.

Detailed explanation-2: -The SSH protocol uses industry standard strong encryption algorithms, like AES, to secure the communication between the involved parties. In addition, the protocol uses hashing algorithms, such as SHA-2, to ensure the integrity of the data transmitted.

Detailed explanation-3: -SSH enables network administrators to access a computer via an unsecured network in a safe manner. It ensures a secure connection that allows it to operate and manage remote computers without worrying about the safety of shared data.

Detailed explanation-4: -Disable Root User Logins. Changing the Default Port. Block Access for Users With Blank Passwords. Limit Login/Access Attempts. Using SSH Version 2. Turning Off TCP Port Forwarding and X11 Forwarding. Connecting With an SSH Key. IP Restrictions for SSH Connections. 03-Jul-2022

There is 1 question to complete.