CompTIA Server+ Exam: Secure Protocols for Remote Server Configuration

Secure Protocols for Remote Server Configuration

Prev Question Next Question

Question

Which of the following protocols can be used to perform configuration management on a remote server using the MOST secure methods? (Select TWO).

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E. F.

CD.

The two protocols that can be used to perform configuration management on a remote server using the MOST secure methods are SSH and DNS.

SSH (Secure Shell) is a cryptographic network protocol that provides secure access to a remote server. SSH encrypts all data transmitted between the client and the server, which makes it an ideal protocol for performing configuration management tasks securely. SSH is widely used in the industry for remote server administration, as it provides a high level of security and can be used to execute commands on a remote server, transfer files securely, and establish secure tunnels.

DNS (Domain Name System) is a protocol that is used to translate domain names into IP addresses. It is a critical component of the internet infrastructure and is used to resolve domain names into IP addresses. While DNS is not typically used for configuration management, it is important to secure DNS servers to prevent DNS spoofing attacks, which can be used to redirect users to malicious websites.

SMTP (Simple Mail Transfer Protocol) is a protocol that is used to send and receive email messages. SMTP is not an ideal protocol for performing configuration management tasks as it is not designed for secure communication and does not provide encryption by default.

DHCP (Dynamic Host Configuration Protocol) is a protocol that is used to automatically assign IP addresses to devices on a network. DHCP is not designed for configuration management and does not provide secure communication.

RDP (Remote Desktop Protocol) is a proprietary protocol that is used to connect to a remote Windows desktop. While RDP is commonly used for remote desktop administration, it is not an ideal protocol for configuration management as it does not provide encryption by default.

TELNET is a protocol that is used to provide terminal access to a remote server. TELNET is not an ideal protocol for configuration management as it does not provide encryption by default and is considered insecure.