Which protocol is commonly used to securely access a remote computer?

Disable ads (and more) with a membership for a one time $4.99 payment

Prepare for the MTA Security Exam with flashcards and multiple choice questions. Each question includes hints and explanations. Get ready for your certification test!

The protocol commonly used to securely access a remote computer is SSH, which stands for Secure Shell. SSH offers a secure channel over an unsecured network by using encryption to protect the data transmitted between the client and the remote server. This ensures that sensitive information, such as login credentials and files, remains confidential and is not susceptible to interception or eavesdropping.

Unlike other options, SSH was specifically designed to replace older protocols that did not have built-in security features. For example, FTP and Telnet transmit data, including authentication information, in plain text, making them vulnerable to attacks. Although HTTP provides a basic framework for web communication, it also lacks the encryption needed for secure access. SSH, on the other hand, not only encrypts the session but also supports various authentication methods, including public key authentication, making it a robust choice for secure remote access.