Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP-ISSAP All Questions

View all questions & answers for the CISSP-ISSAP exam

Exam CISSP-ISSAP topic 2 question 93 discussion

Actual exam question from ISC's CISSP-ISSAP
Question #: 93
Topic #: 2
[All CISSP-ISSAP Questions]

Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol? Each correct answer represents a complete solution. Choose all that apply.

  • A. TIS authentication
  • B. Rhosts (rsh-style) authentication
  • C. Kerberos authentication
  • D. Password-based authentication
Show Suggested Answer Hide Answer
Suggested Answer: BAC 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
n00r1
10 months, 1 week ago
ChatGPT The user authentications supported by the SSH-1 protocol but not by the SSH-2 protocol are: A. TIS authentication B. Rhosts (rsh-style) authentication Explanation: SSH-1 supported TIS authentication and Rhosts authentication. However, these authentication methods are deprecated and considered insecure. SSH-2 focuses on more secure and robust authentication methods such as public key authentication, keyboard-interactive authentication, and GSSAPI (Kerberos) authentication. C. Kerberos authentication is supported by both SSH-1 and SSH-2. D. Password-based authentication is supported by both SSH-1 and SSH-2.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...