Certified Information Systems Security Professional – CISSP – Question368

Which of the following is the BEST type of authentication and encryption for a Secure Shell (SSH) implementation when network traffic traverses between a host and an infrastructure device?

A.
Lightweight Directory Access Protocol (LDAP)
B. Public-key cryptography
C. Remote Authentication Dial-In User Service (RADIUS)
D. Private-key cryptography

Correct Answer: B

Explanation:

Reference: https://books.google.com.pk/books?id=4K7LCgAAQBAJ&pg=PA284&lpg=PA28… +encryption+for+a+Secure+Shell+(SSH)+implementation+when+network+traffic+traverses+between+a+host+and+an +infrastructure+device&source=bl&ots=YEMNN8nfuN&sig=ACfU3U2QMbLySWQ_0VsGjsSJmaHZ_O9Iw&hl=en&sa=X&ved=2ahUKEwjDobCajqrpAhWMHRQKHW2FC4gQ6AEwAHoECBQQAQ#v=onepage&q=ty pe%20of%20authentication%20and%20encryption%20for%20a%20Secure%20Shell%20(SSH)%20implementation%20when %20network%20traffic%20traverses%20between%20a%20host%20and%20an%20infrastructure%20device&f=false