A recent vulnerability scan found that Telnet is enabled on all network devices. Which of the following
protocols should be used instead of Telnet?

A.
SCP
B.
SSH
C.
SFTP
D.
SSL
Explanation:
SSH transmits both authentication traffic and data in a secured encrypted form, whereas Telnet transmits
both authentication credentials and data in clear text.
Incorrect Answers:
A: Secure Copy Protocol (SCP) is a secure file-transfer facility based on SSH and Remote Copy Protocol
(RCP).
C: SFTP encrypts authentication and data traffic between the client and server by making use of SSH to
provide secure FTP communications.
D: Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are used to encrypt traffic between a
web browser and a web server. This allows web surfers to make online purchases, interact with banks,
and access private information without disclosing the contents of their communications.Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp. 42, 45, 47, 50
KEY WORD: UNIX
Both SSH and SCP are Unix Based
SSH is used to establish a command-line, text-only interface connection with a server, router, switch, or similar device over any distance.
Secure Copy Protocol (SCP) is a secure file-transfer facility based on SSH and Remote Copy Protocol (RCP). SCP is commonly used on Linux and Unix platforms.
0
0