ssh(1) -2 -o KexAlgorithms=diffie-hellman-group-exchange-sha256 -c aes192-ctr -o MACs=hmac-sha2-256 -o BatchMode=yes example.com
OpenSSH SSH client (remote login program)
-2      Forces ssh to try protocol version 2 only.
-o option
        Can be used to give options in the format used in the configuration file.  This is useful for
        specifying options for which there is no separate command-line flag.  For full details of the
        options listed below, and their possible values, see ssh_config(5).

              AddressFamily
              BatchMode
              BindAddress
              ChallengeResponseAuthentication
              CheckHostIP
              Cipher
              Ciphers
              ClearAllForwardings
              Compression
              CompressionLevel
              ConnectionAttempts
              ConnectTimeout
              ControlMaster
              ControlPath
              DynamicForward
              EscapeChar
              ExitOnForwardFailure
              ForwardAgent
              ForwardX11
              ForwardX11Trusted
              GatewayPorts
              GlobalKnownHostsFile
              GSSAPIAuthentication
              GSSAPIDelegateCredentials
              HashKnownHosts
              Host
              HostbasedAuthentication
              HostKeyAlgorithms
              HostKeyAlias
              HostName
              IdentityFile
              IdentitiesOnly
              IPQoS
              KbdInteractiveDevices
              KexAlgorithms
              LocalCommand
              LocalForward
              LogLevel
              MACs
              NoHostAuthenticationForLocalhost
              NumberOfPasswordPrompts
              PasswordAuthentication
              PermitLocalCommand
              PKCS11Provider
              Port
              PreferredAuthentications
              Protocol
              ProxyCommand
              PubkeyAuthentication
              RekeyLimit
              RemoteForward
              RequestTTY
              RhostsRSAAuthentication
              RSAAuthentication
              SendEnv
              ServerAliveInterval
              ServerAliveCountMax
              StrictHostKeyChecking
              TCPKeepAlive
              Tunnel
              TunnelDevice
              UsePrivilegedPort
              User
              UserKnownHostsFile
              VerifyHostKeyDNS
              VisualHostKey
              XAuthLocation
-c cipher_spec
        Selects the cipher specification for encrypting the session.

        Protocol version 1 allows specification of a single cipher.  The supported values are “3des”,
        “blowfish”, and “des”.  3des (triple-des) is an encrypt-decrypt-encrypt triple with three different
        keys.  It is believed to be secure.  blowfish is a fast block cipher; it appears very secure and is
        much faster than 3des.  des is only supported in the ssh client for interoperability with legacy
        protocol 1 implementations that do not support the 3des cipher.  Its use is strongly discouraged
        due to cryptographic weaknesses.  The default is “3des”.

        For protocol version 2, cipher_spec is a comma-separated list of ciphers listed in order of
        preference.  See the Ciphers keyword in ssh_config(5) for more information.
ssh connects and logs into the specified hostname (with optional user name).  The user must prove his/her
identity to the remote machine using one of several methods depending on the protocol version used (see
below).

If command is specified, it is executed on the remote host instead of a login shell.
source manpages: ssh