Which of the following transport protocols and port numbers does Secure Shell use?
A. UDP (User Datagram Protocol) port 19
B. TCP (Transmission Control Protocol) port 22
C. TCP (Transmission Control Protocol) port 389
D. UDP (User Datagram Protocol) port 53
Answer: B
Learn More :
Cryptography
- What are the general equations for encryption and decryption in the affine cipher?
- Describe a relationship between plaintext, encryption, decryption and cipher
- Carlos wants to send a message to Alice so only she can understand it. He also wants to send a message to Bob so only Bob can understand it. How many private keys does Carlos need?
- The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
- The ________ method provides a one-time session key for two parties.
- One commonly used public-key cryptography method is the ______ algorithm.
- In an asymmetric-key cipher, the receiver uses the ______ key.
- In an asymmetric-key cipher, the sender uses the__________ key.
- In a(n) ________ cipher, a pair of keys is used.
- In a(n) ________, the key is called the secret key.
- In a(n) ________ cipher, the same key is used by both the sender and receiver.
- The _______ is a number or a set of numbers on which the cipher operates.
- A combination of an encryption algorithm and a decryption algorithm is called a ________.
- A(n) _______ algorithm transforms ciphertext to plaintext.
- A(n) _______ algorithm transforms plaintext to ciphertext.
- The ________ is the message after transformation.
- The ________is the original message before transformation.
- This is the name for the issuer of a PKI certificate.
- This is an encryption/decryption key known only to the party or parties that exchange secret messages.
- Cryptanalysis is used
- What is data encryption standard (DES)?
- In asymmetric key cryptography, the private key is kept by
- In cryptography, what is cipher?
- What is Vulnerability?
- What is Availability?