Best Method for Secure Remote Server Connection | N10-007 CompTIA Network+ Exam

SSH

Prev Question Next Question

Question

A junior network technician is working in the field and needs to connect to the company's remote server, however, doing so will require the junior technician to use the public Internet.

Because security is a concern, which of the following is the BEST method to use?

A.

Telnet B.

SSH C.

SFTP D.

VNC.

B.

Explanations

A junior network technician is working in the field and needs to connect to the company's remote server, however, doing so will require the junior technician to use the public Internet.

Because security is a concern, which of the following is the BEST method to use?

A.

Telnet

B.

SSH

C.

SFTP

D.

VNC.

B.

The BEST method to use in this scenario would be SSH (Secure Shell).

Telnet is an outdated protocol that sends data in plaintext, meaning that any information sent over Telnet can be easily intercepted and read by anyone who has access to the data stream. It is also vulnerable to various types of attacks, such as man-in-the-middle attacks.

SFTP (Secure File Transfer Protocol) is a secure version of FTP that uses encryption to protect data in transit. While SFTP is more secure than Telnet, it is not the best option for connecting to a remote server because it is primarily used for transferring files rather than establishing a remote connection.

VNC (Virtual Network Computing) is a graphical desktop sharing system that allows you to remotely control another computer. However, it is not a secure protocol and can be vulnerable to attacks such as password interception.

SSH (Secure Shell) is a secure protocol that provides encryption for all data transmitted between two devices, making it the best option for connecting to a remote server over the public internet. SSH is designed to prevent eavesdropping, tampering, and other types of attacks. It is also capable of authenticating users and preventing unauthorized access to the remote server.

Therefore, SSH is the BEST method to use in this scenario due to its high level of security and encryption.