Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 179 discussion

Actual exam question from ISC's CISSP
Question #: 179
Topic #: 1
[All CISSP Questions]

Which of the following statements is TRUE about Secure Shell (SSH)?

  • A. SSH supports port forwarding, which can be used to protect less secured protocols.
  • B. SSH does not protect against man-in-the-middle (MITM) attacks.
  • C. SSH is easy to deploy because it requires a Web browser only.
  • D. SSH can be used with almost any application because it is concerned with maintaining a circuit.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Rollizo
Highly Voted 2 years, 1 month ago
Selected Answer: A
Port forwarding via SSH (SSH tunneling) creates a secure connection between a local computer and a remote machine through which services can be relayed. Because the connection is encrypted, SSH tunneling is useful for transmitting information that uses an unencrypted protocol, such as IMAP, VNC, or IRC
upvoted 5 times
jackdryan
1 year, 6 months ago
A is correct
upvoted 1 times
...
...
Soleandheel
Most Recent 11 months, 3 weeks ago
A. SSH supports port forwarding, which can be used to protect less secured protocols. Also known as SSH tunneling. SSH is used on less secure protocols like FTP to make them secure (SFTP) etc.
upvoted 1 times
...
homeysl
1 year, 1 month ago
Selected Answer: A
SFTP is an example
upvoted 1 times
...
74gjd_37
1 year, 2 months ago
Selected Answer: A
Based on the CISSP (Certified Information Systems Security Professional) perspective, the correct statement about Secure Shell (SSH) is: A. SSH supports port forwarding, which can be used to protect less secured protocols. SSH is a protocol used for secure remote access, file transfers and management of network devices. SSH supports port forwarding, also known as SSH tunnelling, which can provide a secure channel to transfer less secured protocols such as Telnet and FTP. SSH protects against man-in-the-middle (MITM) attacks by encrypting the communication between the two devices. It is not easy to deploy because it requires installing and configuring SSH client and server software. Finally, SSH is not concerned with maintaining a circuit, rather it is concerned with providing a secure and encrypted channel for communication.
upvoted 2 times
...
MShaaban
1 year, 3 months ago
Answer is A
upvoted 1 times
...
somkiatr
1 year, 10 months ago
Selected Answer: A
read hear ! https://www.ftpgetter.com/ftp-ssh-tunnel.php
upvoted 1 times
...
sphenixfire
1 year, 12 months ago
Selected Answer: A
correct. also used for pivoting in pentest/attacking
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...