List of questions
Related questions
Question 187 - CISSP-ISSAP discussion
Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol? Each correct answer represents a complete solution. Choose all that apply.
A.
TIS authentication
B.
Rhosts (rsh-style) authentication
C.
Kerberos authentication
D.
Password-based authentication
Your answer:
0 comments
Sorted by
Leave a comment first