Question: Lab 8 . 2 Analysis Questions 1 . What characteristics of data does SSH protect and in what state? 2 . You have heard there

Lab 8.2 Analysis Questions
1. What characteristics of data does SSH protect and in what state?
2. You have heard there are exploits available that can compromise the SSH1 protocol. What are the steps to ensure that you use version 2?
3. You are the administrator for a Metasploitable server that is also an SSH server. A user wants to verify that he is connecting to the correct server and would like to know what the fingerprint is for the server. What is the command that you would type to retrieve the fingerprint of your host key?
4. The senior administrator at your company is considering making Telnet available for users to remotely access a server. Explain why using SSH would be a better choice
5. The senior administrator would like to know what concerns he should have regarding the implementation of SSH. Explain what issues may arise in the use of SSH.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!