What protocol creates a secure channel between two devices, so that one device can control the other?
Secure Shell
Note: SSH was designed as a replacement for TELNET. It is very heavily used in Unix/Linux and Windows.
What are the two requirements to use SSH?
A server (daemon) and a client on the other device that will take control of the daemon.
What port does SSH run on and what about Secure FTP?
Port 22
Note: Secure copy also runs on Port 22.
What encryption protocol does SSH 2.0 use?
Diffie-Hellman Key Exchange and Message Authentication Codes (MAC)
Note: SSH is used frequently in security.