New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Cybersecurity-Audit-Certificate Exam - Topic 3 Question 38 Discussion

Actual exam question for Isaca's Cybersecurity-Audit-Certificate exam
Question #: 38
Topic #: 3
[All Cybersecurity-Audit-Certificate Questions]

At which layer in the open systems interconnection (OSI) model does SSH operate?

Show Suggested Answer Hide Answer
Suggested Answer: D

Replicating privileged access to a user's own mobile device presents the greatest risk to corporate data. This is because it potentially allows unauthorized access to sensitive information if the device is lost, stolen, or compromised. Privileged access means having elevated permissions that are typically reserved for administrators. When such access is available on a personal device, it bypasses many of the security controls that a company would normally have in place.

Option A, remote wipe, is actually a security feature that can protect data if a device is lost or stolen. Option B, lack of training, can increase risk but does not directly expose data like privileged access does. Option C, devices not obtained through corporate provisioning, can be a risk, but this risk is generally less than that of replicating privileged access.


Contribute your Thoughts:

0/2000 characters
Viki
2 months ago
I thought it was the Session layer for a second.
upvoted 0 times
...
Willis
2 months ago
Totally agree, it's definitely the Application layer!
upvoted 0 times
...
Starr
2 months ago
SSH operates at the Application layer.
upvoted 0 times
...
Antione
3 months ago
Yeah, it's Application. No doubt about it!
upvoted 0 times
...
Sharita
3 months ago
Wait, are you sure it's not the Presentation layer?
upvoted 0 times
...
Levi
3 months ago
I definitely recall SSH being associated with the Application layer from my study notes.
upvoted 0 times
...
Val
3 months ago
I’m leaning towards the Presentation layer, but I could be mixing it up with another protocol.
upvoted 0 times
...
Janessa
4 months ago
I remember practicing a question about SSH and the OSI model, and I think it was related to the Session layer.
upvoted 0 times
...
Ariel
4 months ago
I think SSH operates at the Application layer, but I’m not completely sure.
upvoted 0 times
...
Tom
4 months ago
I'm drawing a blank on the OSI layers. Maybe I should just make an educated guess and move on. I'll select D, the network layer, but I'm not very confident about that.
upvoted 0 times
...
Gerald
4 months ago
Okay, let me think this through. SSH is used for remote access and secure communication, so it's probably not at the presentation or network layers. I'll guess C, the application layer.
upvoted 0 times
...
Stevie
4 months ago
The OSI model can be tricky to remember, but I think SSH is a secure shell protocol, so it must be at the session layer. I'll go with B.
upvoted 0 times
...
Linsey
5 months ago
Hmm, I'm a bit unsure about this one. I know SSH is a network protocol, but I can't remember which OSI layer it's associated with.
upvoted 0 times
...
Bobbie
5 months ago
I'm pretty sure SSH operates at the application layer, so I'll go with C.
upvoted 0 times
...
Lashawn
10 months ago
I'm feeling a bit session-al today, so I'll go with B. Hopefully, it's not a network outage!
upvoted 0 times
...
Matt
10 months ago
Definitely the Application layer. That's where all the cool, secure protocols like SSH live, right? *winks*
upvoted 0 times
Edgar
8 months ago
Absolutely! SSH is a secure protocol that operates at the Application layer.
upvoted 0 times
...
Moira
9 months ago
That's right! SSH is indeed a protocol that operates at the Application layer.
upvoted 0 times
...
Lili
9 months ago
Yes, you're correct! SSH operates at the Application layer.
upvoted 0 times
...
...
Tiffiny
10 months ago
Hmm, I thought SSH was a Session layer protocol. Guess I need to brush up on my OSI model knowledge.
upvoted 0 times
Markus
9 months ago
D) Network
upvoted 0 times
...
Andra
9 months ago
C) Application
upvoted 0 times
...
Haydee
9 months ago
B) Session
upvoted 0 times
...
Ruth
9 months ago
A) Presentation
upvoted 0 times
...
...
Geraldine
10 months ago
SSH operates at the Application layer of the OSI model, so I'm going with C.
upvoted 0 times
...
Casie
10 months ago
I'm not sure, but I think SSH operates at the Network layer because it deals with network connections.
upvoted 0 times
...
Gilma
11 months ago
I agree with Staci, SSH does operate at the Application layer because it provides secure communication between applications.
upvoted 0 times
...
Staci
11 months ago
I think SSH operates at the Application layer.
upvoted 0 times
...

Save Cancel