CBSE Class 10 Computer Applications
Question 36 of 79
Internet Services — Question 7
Back to all questions 7
Question Question 7
How does an SSH protocol protect data?
The SSH (Secure Socket Shell) protocol protects data in the following ways:
- Before transferring data between the client and the host computer, the SSH calls upon the SFTP (Secure File Transfer Protocol) to authenticate both the server and the client machine.
- Once the authentication process gets over, the SFTP protocol works on to set a secure channel between the client and the host computer by establishing a secure connection and then only the data transmission is initiated.
- SFTP (Secure File Transfer Protocol) protects the integrity of the data using encryption and cryptographic hash function techniques.