Which remote access method is considered secure according to policy?

Study for the CCST Cybersecurity Test. Study with flashcards and multiple choice questions, each question has hints and explanations. Get ready for your exam!

Multiple Choice

Which remote access method is considered secure according to policy?

Explanation:
Remote access should be conducted over encrypted, authenticated channels to protect credentials and data. The insecure options transmit data in plaintext, making interception easy. Telnet sends commands and usernames in clear text; FTP does not encrypt file transfers or authentication by default; HTTP is not encrypted and not appropriate for remote administration. SSH encrypts the session and authenticates both ends for secure command-line access, and a VPN creates an encrypted tunnel that secures all traffic between the remote user and the internal network. Because of these protections, using SSH or a VPN is considered secure for remote access according to policy.

Remote access should be conducted over encrypted, authenticated channels to protect credentials and data. The insecure options transmit data in plaintext, making interception easy. Telnet sends commands and usernames in clear text; FTP does not encrypt file transfers or authentication by default; HTTP is not encrypted and not appropriate for remote administration. SSH encrypts the session and authenticates both ends for secure command-line access, and a VPN creates an encrypted tunnel that secures all traffic between the remote user and the internal network. Because of these protections, using SSH or a VPN is considered secure for remote access according to policy.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy