PrepAway - Latest Free Exam Questions & Answers

Which one of the following CANNOT be prevented by the Secure Shell (SSH) program?

Which one of the following CANNOT be prevented by the Secure Shell (SSH) program?

PrepAway - Latest Free Exam Questions & Answers

A.
Internet Protocol (IP) spoofing.

B.
Data manipulation during transmissions.

C.
Network based birthday attack.

D.
Compromise of the source/destination host.

Explanation:
This is a question that I disagreed with. The premises that SSH does use RSA and 3DES, thus
susceptible to cryptographic attack (namely birthday attach) has merit but I think the answer is more
simple, in that you SSH cant protect against a compromised source/destination. You can safely rule
out spoofing and manipulation (that is the job of ssh to protect the transmission). Original answer
was C birthday attack. Use your best judgment based on knowledge and experience. The use of ssh
helps to correct these vulnerabilities. Specifically, ssh protects against these attacks: IP spoofing
(where the spoofer is on either a remote or local host), IP source routing, DNS spoofing, interception
of cleartext passwords/data and attacks based on listening to X authentication data and spoofed
connections to an X11 server. http://www- arc.com/sara/cve/SSH_vulnerabilities.html Birthday
attack – Usually applied to the probability of two different messages using the same hash function
that produces a common message digest; or given a message and its corresponding message digest,
finding another message that when passed through the same hash function generates the same
specific message digest. The term “birthday” comes from the fact that in a room with 23 people, the
probability of two people having the same birthday is great than 50 percent. -Ronald Krutz The CISSP
PREP Guide (gold edition) pg 212


Leave a Reply