{"id":890,"date":"2021-01-17T05:41:35","date_gmt":"2021-01-16T18:08:03","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/SSCP\/systems-security-certified-practitioner-sscp-question0882\/"},"modified":"2021-01-17T05:44:48","modified_gmt":"2021-01-17T05:44:48","slug":"systems-security-certified-practitioner-sscp-question0882","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/SSCP\/systems-security-certified-practitioner-sscp-question0882\/","title":{"rendered":"Systems Security Certified Practitioner &#8211; SSCP &#8211; Question0882"},"content":{"rendered":"<div class=\"question\">Secure Shell (SSH-2) provides all the following services except: <br \/><strong><br \/>A.<\/strong> secure remote login <br \/><strong>B.<\/strong> command execution <br \/><strong>C.<\/strong> port forwarding <br \/><strong>D.<\/strong> user authentication<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>D<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nThis is one of the tricky negative question. You have to pay close attention to the word EXCEPT within the question.<br \/>\nThe SSH transport layer is a secure, low level transport protocol. It provides strong encryption, cryptographic host authentication, and integrity protection.<br \/>\nAuthentication in this protocol level is host-based; this protocol does not perform user authentication. A higher level protocol for user authentication can be designed on top of this protocol.<br \/>\nThe protocol has been designed to be simple and flexible to allow parameter negotiation, and to minimize the number of round-trips. The key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated. It is expected that in most environments, only 2 round-trips will be needed for full key exchange, server authentication, service request, and acceptance notification of service request. The worst case is 3 round-trips.<br \/>\nThe following are incorrect answers:<br \/>\n&#8220;Remote log-on&#8221; is incorrect. SSH does provide remote log-on. &#8220;Command execution&#8221; is incorrect. SSH does provide command execution.<br \/>\n&#8220;Port forwarding&#8221; is incorrect. SSH does provide port forwarding. SSH also has a wonderful feature called SSH Port Forwarding, sometimes called SSH Tunneling, which allows you to establish a secure SSH session and then tunnel arbitrary TCP connections through it. Tunnels can be created at any time, with almost no effort and no programming, which makes them very appealing. See the article below in the reference to take a look at SSH Port Forwarding in detail, as it is a very useful but often misunderstood technology. SSH Port Forwarding can be used for secure communications in a myriad of different ways.<br \/>\nYou can see a nice tutorial on the PUTTY web site on how to use PUTTY to do port forwarding at: <a href=\"http:\/\/www.cs.uu.nl\/technical\/services\/ssh\/putty\/puttyfw.html\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">http:\/\/www.cs.uu.nl\/technical\/services\/ssh\/putty\/puttyfw.html<\/a><br \/>\nReference(s) used for this question: RFC 4253 at <a href=\"https:\/\/www.ietf.org\/rfc\/rfc4253.txt\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/www.ietf.org\/rfc\/rfc4253.txt<\/a> and SSH Port Forwarding by Symantec<\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Secure Shell (SSH-2) provides all the following services except: A. secure remote login B. command execution C. port forwarding D. user authentication Show Answer Hide Answer Correct Answer: D Explanation: This is one of the tricky negative question. You have to pay close attention to the word EXCEPT within the question. The SSH transport layer [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[1078,885,3],"class_list":["post-890","post","type-post","status-publish","format-standard","hentry","category-systems-security-certified-practitioner-sscp","tag-choices","tag-question-0882","tag-systems-security-certified-practitioner-sscp"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/comments?post=890"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/890\/revisions"}],"predecessor-version":[{"id":1966,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/890\/revisions\/1966"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/media?parent=890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/categories?post=890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/tags?post=890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}