Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol? Each correct answer represents a complete solution. Choose all that apply.
ChatGPT
The user authentications supported by the SSH-1 protocol but not by the SSH-2 protocol are:
A. TIS authentication
B. Rhosts (rsh-style) authentication
Explanation:
SSH-1 supported TIS authentication and Rhosts authentication. However, these authentication methods are deprecated and considered insecure. SSH-2 focuses on more secure and robust authentication methods such as public key authentication, keyboard-interactive authentication, and GSSAPI (Kerberos) authentication.
C. Kerberos authentication is supported by both SSH-1 and SSH-2.
D. Password-based authentication is supported by both SSH-1 and SSH-2.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
n00r1
10 months, 1 week ago