CompTIA ITF+ Practice Test 2026 - Free CompTIA ITF+ Practice Questions and Study Guide

1 / 400

Which protocol is used to securely access a network device over an unsecured network?

FTP

HTTP

SSH

SSH, or Secure Shell, is the correct answer because it provides a secure method for accessing network devices over unsecured networks. Unlike protocols such as FTP (File Transfer Protocol) and HTTP (Hypertext Transfer Protocol), which transmit data in plaintext and can be intercepted, SSH encrypts the data being sent over the network, ensuring that it remains confidential and secure from any potential eavesdroppers.

SSH is widely used by network administrators to manage devices and servers remotely. It offers strong authentication mechanisms, including the use of keys, which adds an additional layer of security over the basic username and password authentication methods. By establishing a secure channel over an unsecured network, SSH protects sensitive information and commands from being exposed to unauthorized users.

TCP, on the other hand, is a transport layer protocol that establishes connections for data transmission but does not provide any inherent encryption or security features. Therefore, while TCP is essential for communication, it does not fulfill the requirement of secure access to network devices.

In summary, SSH is the protocol designed specifically for secure access to network devices over potentially insecure networks, making it the appropriate choice for this scenario.

Get further explanation with Examzify DeepDiveBeta

TCP

Next Question
Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy