SSH Protection: Understanding the Key Advantages | Exam Prep Guide

SSH Protection

Question

Against which of the following does SSH provide protection? Each correct answer represents a complete solution.

Choose two.

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

AC.

SSH (Secure Shell) is a cryptographic network protocol that provides secure communication between two untrusted hosts over an insecure network. It is commonly used for secure remote access to a computer or server, file transfer, and for tunneling traffic between machines.

Among the options given, SSH provides protection against IP spoofing and password sniffing.

IP Spoofing is a type of attack where an attacker forges the source IP address in a network packet, which can be used to disguise their identity or to launch a denial of service (DoS) attack. SSH provides protection against IP Spoofing by using public-key cryptography to authenticate the identity of the remote host. When a user connects to a remote host using SSH, the remote host's public key is verified against a trusted database to ensure that the user is connecting to the intended host and not to an impostor.

Password Sniffing is a type of attack where an attacker intercepts network traffic to steal login credentials such as usernames and passwords. SSH provides protection against password sniffing by encrypting all data sent between the client and the server, including login credentials. This makes it difficult for an attacker to intercept and decode sensitive information.

Broadcast Storms and DoS attacks are not directly protected against by SSH. A broadcast storm is a type of network disruption caused by a high volume of broadcast traffic, which can lead to network congestion and slow down or crash the network. DoS (Denial of Service) attacks are a type of attack that flood a network with traffic, rendering it unavailable to legitimate users. To protect against these types of attacks, other security measures such as firewalls, intrusion detection systems, and network traffic analysis tools should be used.