Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam Cybersecurity-Audit-Certificate Topic 3 Question 38 Discussion

Actual exam question for Isaca's Cybersecurity-Audit-Certificate exam
Question #: 38
Topic #: 3
[All Cybersecurity-Audit-Certificate Questions]

At which layer in the open systems interconnection (OSI) model does SSH operate?

Show Suggested Answer Hide Answer
Suggested Answer: D

Replicating privileged access to a user's own mobile device presents the greatest risk to corporate data. This is because it potentially allows unauthorized access to sensitive information if the device is lost, stolen, or compromised. Privileged access means having elevated permissions that are typically reserved for administrators. When such access is available on a personal device, it bypasses many of the security controls that a company would normally have in place.

Option A, remote wipe, is actually a security feature that can protect data if a device is lost or stolen. Option B, lack of training, can increase risk but does not directly expose data like privileged access does. Option C, devices not obtained through corporate provisioning, can be a risk, but this risk is generally less than that of replicating privileged access.


Contribute your Thoughts:

Lashawn
1 months ago
I'm feeling a bit session-al today, so I'll go with B. Hopefully, it's not a network outage!
upvoted 0 times
...
Matt
2 months ago
Definitely the Application layer. That's where all the cool, secure protocols like SSH live, right? *winks*
upvoted 0 times
Edgar
19 hours ago
Absolutely! SSH is a secure protocol that operates at the Application layer.
upvoted 0 times
...
Moira
13 days ago
That's right! SSH is indeed a protocol that operates at the Application layer.
upvoted 0 times
...
Lili
1 months ago
Yes, you're correct! SSH operates at the Application layer.
upvoted 0 times
...
...
Tiffiny
2 months ago
Hmm, I thought SSH was a Session layer protocol. Guess I need to brush up on my OSI model knowledge.
upvoted 0 times
Markus
14 days ago
D) Network
upvoted 0 times
...
Andra
18 days ago
C) Application
upvoted 0 times
...
Haydee
1 months ago
B) Session
upvoted 0 times
...
Ruth
1 months ago
A) Presentation
upvoted 0 times
...
...
Geraldine
2 months ago
SSH operates at the Application layer of the OSI model, so I'm going with C.
upvoted 0 times
...
Casie
2 months ago
I'm not sure, but I think SSH operates at the Network layer because it deals with network connections.
upvoted 0 times
...
Gilma
2 months ago
I agree with Staci, SSH does operate at the Application layer because it provides secure communication between applications.
upvoted 0 times
...
Staci
3 months ago
I think SSH operates at the Application layer.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77