Secure Protocols and Their Use Cases
In this section, we are going to look in detail at the various secure protocols and their use cases. The Security+ exam wants you to select the correct secure protocol for a given scenario to make your environment secure.
As most protocols use TCP ports, I will only mention the UDP ports, and therefore you can assume that if something is not labeled UDP, it is TCP. We will look at the secure protocols and their use cases:
Let's look at each of them:
- SSH: This was invented to replace Telnet so that commands could be run securely; it is commonly used when you want remote access to network devices. It can be used as a command-line tool or in a Graphical User Interface (GUI), but it is not browser-based.
- SCP: This is used to transfer files securely between hosts in a Linux environment.
- SFTP: This allows us to encrypt authentication and download files securely so that they cannot be tampered with...