CompTIA Server+ Exam: Authentication Protocols for Remote SSH Connection

Authentication Protocols for Remote SSH Connection

Prev Question Next Question

Question

Which of the following authentication protocols could be used to authenticate network administrators at a datacenter to manage switches over a remote SSH connection? (Select TWO).

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E. F.

BC.

The two authentication protocols that could be used to authenticate network administrators at a datacenter to manage switches over a remote SSH connection are TACACS and RADIUS.

TACACS (Terminal Access Controller Access-Control System) is a security protocol that provides centralized authentication, authorization, and accounting services for remote access to network devices. TACACS+ is the newer version of TACACS and offers more security features than its predecessor. It uses a client-server model, where the TACACS+ server is responsible for authentication, authorization, and accounting, and the client is responsible for sending requests to the server. TACACS+ is often used in enterprise environments where security is a top priority.

RADIUS (Remote Authentication Dial-In User Service) is a networking protocol that provides centralized authentication, authorization, and accounting services for users who connect and use a network service. It is often used for remote access, such as dial-up connections and virtual private network ( VPN) connections. RADIUS uses a client-server model, where the RADIUS server is responsible for authentication, authorization, and accounting, and the client is responsible for sending requests to the server. RADIUS is widely used in enterprise environments and is supported by many network devices and servers.

LDAP (Lightweight Directory Access Protocol) is a protocol used for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. It is often used for user authentication and authorization in enterprise environments. However, it is not typically used for network device authentication.

SNMP (Simple Network Management Protocol) is a protocol used for managing and monitoring network devices such as switches, routers, and servers. It is not used for authentication.

IPSec (Internet Protocol Security) is a protocol used for securing Internet Protocol (IP) communications. It is often used for VPN connections, but it is not used for authentication.

MSCHAP (Microsoft Challenge-Handshake Authentication Protocol) is a protocol used for authenticating users who connect to Microsoft networks. It is not typically used for network device authentication.

In summary, the two authentication protocols that could be used to authenticate network administrators at a datacenter to manage switches over a remote SSH connection are TACACS and RADIUS.