Final Quiz

Final Quiz

University

17 Qs

quiz-placeholder

Similar activities

Protocolo TELNET y SSH

Protocolo TELNET y SSH

University

12 Qs

Administrasi Sistem Jaringan

Administrasi Sistem Jaringan

University

17 Qs

Port Numbers

Port Numbers

University

18 Qs

Quiz de Control de Acceso Remoto

Quiz de Control de Acceso Remoto

11th Grade - University

20 Qs

FQuiz2 BSIT4C

FQuiz2 BSIT4C

University

15 Qs

Computer port numbers

Computer port numbers

3rd Grade - Professional Development

18 Qs

Protokoły sieciowe

Protokoły sieciowe

1st Grade - University

12 Qs

Sistemas Operativos

Sistemas Operativos

University

20 Qs

Final Quiz

Final Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Kelly Gafford

Used 1+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Imagine LT Daniels, SSG Maya, and SPC Henry are on a deployment. They need to send messages over an unsecured network. What tool should they use to keep their communications encrypted and safe?

They should use SSH to encrypt their communications

They should transmit their data in plaintext

They should intercept and read packets using Wireshark

They should implement additional overhead from a third party application

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your coworkers are having a heated debate about network protocols and are trying to figure out which protocol SSH uses by default. Can you help them settle this?

TCP on port 22

UDP on port 22

TCP on port 23

UDP on port 23

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Imagine you're in a thrilling coding competition with Olivia, Luna, and Ethan. You're tasked with identifying the main configuration file for OpenSSH. Can you figure it out?

/etc/ssh/sshd_config

/etc/ssh/config

/etc/ssh/ssh_config

/etc/ssh/ssh_config.d

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CPLs Hernandez and Chandra are having a heated debate about SSH configurations. They are particularly stuck on the function of the PermitRootLogin configuration option in sshd_config. Can you help them out?

It allows or denies root login via SSH

It enables or disables password authentication

It specifies the port number for SSH

It sets the maximum number of concurrent SSH connections

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Imagine Ensign Daniel and CPO Harper are trying to secure their server. They need to remove an entry from the known_hosts file. Which command would they use?

ssh-keygen -R

ssh-keygen -r

ssh-keygen -D

ssh-keygen -d

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Imagine Benjamin, Ava, and Elijah are trying to set up a secure connection for their new online game. Why would they use key authentication in SSH?

To enable them to log into their game server using a unique key

To encrypt the data being sent to and from their game server

To provide another method of logging into their game server

To copy game files to and from their game server

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You and CPT Steve Rogers are working on a project together and need to transfer files to and from a remote system in OpenSSH. Which utility should you use?

scp

sftp

ftp

telnet

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?