SSH Troubleshooting: How to Enable SSH on a System - CompTIA Network+ Exam N10-007

SSH Troubleshooting: How to Enable SSH on a System

Prev Question Next Question

Question

A technician logs onto a system using Telnet because SSH is unavailable.

SSH is enabled on the target device, and access is allowed from all subnets.

The technician discovers a critical step was missed.

Which of the following would allow SSH to function properly?

A.

Perform file hashing B.

Generate new keys C.

Update firmware D.

Change default credentials.

B.

Explanations

A technician logs onto a system using Telnet because SSH is unavailable.

SSH is enabled on the target device, and access is allowed from all subnets.

The technician discovers a critical step was missed.

Which of the following would allow SSH to function properly?

A.

Perform file hashing

B.

Generate new keys

C.

Update firmware

D.

Change default credentials.

B.

The correct answer is B: Generate new keys.

Telnet and SSH are both protocols used for remote access to network devices. However, SSH is considered a more secure protocol than Telnet because it encrypts data and authentication information.

In this scenario, the technician is using Telnet because SSH is unavailable, indicating that there may be an issue with the SSH configuration on the target device. The fact that access is allowed from all subnets suggests that the problem may not be related to access control.

The critical step that was missed is not specified, but generating new keys is a common step in configuring SSH on a device. SSH uses cryptographic keys to authenticate clients and servers and to encrypt data. If the keys on the target device are corrupted, outdated, or missing, then SSH will not function properly.

Performing file hashing (option A) is a technique used to verify the integrity of files by generating a unique digital signature. While file hashing can be useful for verifying the integrity of configuration files or firmware, it is not directly related to enabling SSH.

Updating firmware (option C) may be necessary for resolving certain issues, but it is not necessarily related to enabling SSH.

Changing default credentials (option D) is also an important security practice, but it is not directly related to enabling SSH.