answersLogoWhite

0

How does SSH operate as a network?

Updated: 8/20/2019
User Avatar

Wiki User

11y ago

Best Answer

SSH (secure shell), works by allowing data to be stored and a access key to be provided. Anyone who has the key is able to retrieve the information that was stored online.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How does SSH operate as a network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Why is it advisable that a network administrator use SSH instead of Telnet when managing?

SSH is more secure than Telnet.


What protocol is used to encrypt data as it travels a network?

SSH and HTTPS


How does a network operate?

The network is a...


What is the purpose of Putty SSH?

PuTTY, or putty, is an open sourced terminal emulator that can control SSH connections, as well as transfer files across a network, and act as a serial console.


As compare to SSH what is the primary disadvantage of telnet?

Telnet is non secure, travel data in open form you can easily theft/capture data, ssh is secure transmission of data over network, telnet is little bit faster than SSH, because it is not encrypting data, SSh is little slower than telnet because encrypt data when transmitting over network


What does ssh in Linux stsnds for?

SSH stands for Secure Shell. (Often shown as Secure SHell.) It is a secure method for a host computer to connect to a remote computer on the network or over the internet.


What should be used as a replacement for telnet for secure remote login over an insecure network?

ssh protocol


What is the definition of 'ssh' in terms of computers?

In terms of computers, the term "SSH" stands for Secure Shell. This is a method of communicating with another computer through a secured network, all data sent through this system are encrypted.


Which protocol allows secure in-band management so that a network administrator can monitor and configure network devices without fear of any passwords being compromised?

SSH


What is meant by the term securing your perimeter network security?

your perimeter network is the network you operate such as you have the internet and your network your network is your perimeter


Which directory holds encryption keys for users connection to ssh servers?

Typically it would be a hidden folder called ".ssh".


How do you use SSH?

SSH is extremely simple. Using the SSH client, you connect to the computer running the SSH server using the commandssh [ip address or hostname here]