PrepAway - Latest Free Exam Questions & Answers

Which one of the following CANNOT be prevented by the Secure Shell (SSH) program?

Which one of the following CANNOT be prevented by the Secure Shell (SSH) program?

PrepAway - Latest Free Exam Questions & Answers

A.
Internet Protocol (IP) spoofing.

B.
Data manipulation during transmissions.

C.
Network based birthday attack.

D.
Compromise of the source/destination host.

Explanation:
This is a question that I disagreed with. The premises that SSH does use RSA and
3DES, thus susceptible to cryptographic attack (namely birthday attach) has merit but I think the
answer is more simple, in that you SSH cant protect against a compromised source/destination.
You can safely rule out spoofing and manipulation (that is the job of ssh to protect the
transmission). Original answer was C birthday attack. Use your best judgment based on
knowledge and experience.
The use of ssh helps to correct these vulnerabilities. Specifically, ssh protects against these
attacks: IP spoofing (where the spoofer is on either a remote or local host), IP source routing, DNS
spoofing, interception of cleartext passwords/data and attacks based on listening to X
authentication data and spoofed connections to an X11 server. http://wwwarc.com/sara/cve/SSH_vulnerabilities.html
Birthday attack – Usually applied to the probability of two different messages using the same hash
function that produces a common message digest; or given a message and its corresponding
message digest, finding another message that when passed through the same hash function
generates the same specific message digest. The term “birthday” comes from the fact that in a
room with 23 people, the probability of two people having the same birthday is great than 50
percent. -Ronald Krutz The CISSP PREP Guide (gold edition) pg 212


Leave a Reply