The SSH Connection Protocol runs on top of the SSH Transport Layer Protocol and assumes that a secure authentication connection is in use.
(a) True
(b) False
The question was posed to me in an online interview.
This intriguing question comes from Secure Shell(SSH) topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security