Prepare for the CompTIA Cloud+ Certification with a comprehensive practice test. Test your knowledge on cloud architecture, deployment, security, and troubleshooting with detailed questions and answers. Enhance your readiness today!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which protocol is recommended for secure remote access that protects against snooping?

  1. RDP

  2. Telnet

  3. IPsec

  4. SSH

The correct answer is: SSH

The choice of SSH (Secure Shell) as the protocol recommended for secure remote access is rooted in its ability to provide encrypted communication over insecure networks. SSH encrypts the data transmitted between the client and the server, thereby protecting it from unauthorized access or snooping by third parties. This strong encryption ensures that sensitive data, such as passwords and configuration commands, are kept secure against potential interception. SSH also includes features like authentication and integrity checks, which further enhance its security. This makes it a preferred protocol for not only remote access to server environments but also for secure file transfers and tunneling other applications securely through an encrypted channel. While RDP is also a secure protocol used for remote desktop connections, it is more commonly utilized in Windows environments and may require additional configuration to ensure its secure operation. Telnet, on the other hand, does not provide any encryption, making it highly vulnerable to interception and data leaks during transmission. IPsec is a protocol suite used mainly for securing Internet Protocol (IP) communications but is not typically used directly for remote shell access in the way SSH is. Therefore, SSH stands out as the suitable choice for secure remote access that effectively protects against snooping.