Highly Classified Data Security - Best Protocols | CompTIA Server+ Exam SK0-004

Best Protocol for Sharing Highly Classified Data

Prev Question Next Question

Question

Highly classified data is being shared on a company network.

The systems administrator needs to ensure the data is safe and only necessary personnel can access it.

Which of the following protocols would be BEST to use for this type of data to be shared?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.

The protocol that would be best to use for sharing highly classified data on a company network while ensuring its safety and restricting access to only necessary personnel is SSH (Secure Shell).

SSH is a secure network protocol that is designed to allow secure remote access and control of networked devices. It uses encryption to protect the communication between two devices, making it difficult for unauthorized users to access the data being transmitted. It is commonly used by system administrators to manage remote servers securely.

SCP (Secure Copy) is a protocol that is used to securely transfer files between two devices over a network. It is based on SSH and uses the same encryption techniques to ensure the safety of data being transferred. SCP is also commonly used by system administrators to copy files securely between remote servers.

NTP (Network Time Protocol) is a protocol that is used to synchronize the clocks of devices on a network. It is not designed for secure data transfer or access control and would not be suitable for sharing highly classified data.

FTP (File Transfer Protocol) is a protocol that is used to transfer files between devices over a network. However, it is not secure as it sends data in plain text, making it easy for unauthorized users to intercept and access the data being transferred. For this reason, FTP would not be suitable for sharing highly classified data.

In conclusion, SSH is the best protocol to use for sharing highly classified data on a company network because it provides secure remote access and control of networked devices and uses encryption to protect the data being transmitted.