1. Secure shell (SSH) network protocol is used for __________
a) secure data communication
b) remote command-line login
c) remote command execution
d) all of the mentioned
Explanation: SSH provides high encryption and security features while communicating through a network. It is a cryptographic network protocol.
2. SSH can be used in only _____________
a) unix-like operating systems
b) windows
c) both unix-like and windows systems
d) none of the mentioned
Explanation: SSH isn’t confined to a certain network or operating system. It can be implemented over different networks and on different operating systems.
3. SSH uses ___________ to authenticate the remote computer.
a) public-key cryptography
b) private-key cryptography
c) any of public-key or private-key
d) both public-key & private-key
Explanation: Public encryption key is slower but more flexible. Every cryptographic security system requires a private key for private access and a public key for location.
4. Which standard TCP port is assigned for contacting SSH servers?
a) port 21
b) port 22
c) port 23
d) port 24
Explanation: Port 22 is used for contacting ssh servers, used for file transfers (scp, sftp) and also port forwarding.
5. Which one of the following protocol can be used for login to a shell on a remote host except SSH?
a) telnet
b) rlogin
c) both telnet and rlogin
d) none of the mentioned
Explanation: SSH is more secured then telnet and rlogin.
6. Which one of the following is a file transfer protocol using SSH?
a) SCP
b) SFTP
c) Rsync
d) All of the mentioned
Explanation: SCP (Secure copy protocol), SFTP (SSH File Transfer Protocol) and Rsync all are file transfer protocols which are used by SSH.
7. SSH-2 does not contain ______________
a) transport layer
b) user authentication layer
c) physical layer
d) connection layer
Explanation: SSH2 is a more secure, portable and efficient version of SSH that includes SFTP, which is functionally similar to FTP, but is SSH2 encrypted.
8. Which one of the following feature was present in SSH protocol, version 1?
a) password changing
b) periodic replacement of session keys
c) support for public-key certificates
d) none of the mentioned
Explanation: All of the mentioned features are provided by SSH-2 and that SSH-1 only provide strong authentication and guarantee confidentiality.
9. SCP protocol is evolved from __________ over SSH.
a) RCP protocol
b) DHCP protocol
c) MGCP protocol
d) GCP protocol
Explanation: RCP is the abbreviation for Rate Control Protocol is a congestion control algorithm for fast user response times.
10. Which one of the following authentication method is used by SSH?
a) public-key
b) host based
c) password
d) all of the mentioned
Explanation: SSH used public key authentication, Password authentication, Host based authentication, keyboard authentication and authentication of servers.
Why Computer Network ?
What in the Cyber World is SSH?
SSH, or Secure Shell, is like the superhero of computer networks. It lets you remotely connect to another computer, making you feel like a tech wizard in your own home.
Secure Your Connection, Not Your Browsing History
Imagine SSH as your secret tunnel in the digital world. It encrypts your data, making it as secure as a squirrel hiding its acorns.
Ever worried about someone snooping around your online secrets? Fear not! SSH has your back, adding an extra layer of protection. It's like putting your data in a high-tech vault guarded by cyber dragons.
Easy Peasy Connection with SSH Magic
SSH isn't just about security; it's also about convenience. No need to physically be at your computer; SSH lets you control it from anywhere. Forget reaching for your keyboard—your commands travel through the digital airwaves.
And yes, it's as simple as sending a text. SSH speaks a language computers understand, allowing you to boss around your machine effortlessly.
Final Thoughts: SSH - Your Digital Sidekick
So, there you have it, friends! SSH is your trusty sidekick in the vast landscape of computer networks. It's not just about security; it's about embracing the freedom to control your digital kingdom from wherever you are.
Remember, in the world of technology, SSH is your cape-wearing hero, ensuring your data remains safe and sound. Now, go forth and SSH with confidence, my fellow tech adventurers!