
Final Quiz
Authored by Kelly Gafford
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
17 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Imagine LT Daniels, SSG Maya, and SPC Henry are on a deployment. They need to send messages over an unsecured network. What tool should they use to keep their communications encrypted and safe?
They should use SSH to encrypt their communications
They should transmit their data in plaintext
They should intercept and read packets using Wireshark
They should implement additional overhead from a third party application
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your coworkers are having a heated debate about network protocols and are trying to figure out which protocol SSH uses by default. Can you help them settle this?
TCP on port 22
UDP on port 22
TCP on port 23
UDP on port 23
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Imagine you're in a thrilling coding competition with Olivia, Luna, and Ethan. You're tasked with identifying the main configuration file for OpenSSH. Can you figure it out?
/etc/ssh/sshd_config
/etc/ssh/config
/etc/ssh/ssh_config
/etc/ssh/ssh_config.d
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
CPLs Hernandez and Chandra are having a heated debate about SSH configurations. They are particularly stuck on the function of the PermitRootLogin configuration option in sshd_config. Can you help them out?
It allows or denies root login via SSH
It enables or disables password authentication
It specifies the port number for SSH
It sets the maximum number of concurrent SSH connections
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Imagine Ensign Daniel and CPO Harper are trying to secure their server. They need to remove an entry from the known_hosts file. Which command would they use?
ssh-keygen -R
ssh-keygen -r
ssh-keygen -D
ssh-keygen -d
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Imagine Benjamin, Ava, and Elijah are trying to set up a secure connection for their new online game. Why would they use key authentication in SSH?
To enable them to log into their game server using a unique key
To encrypt the data being sent to and from their game server
To provide another method of logging into their game server
To copy game files to and from their game server
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You and CPT Steve Rogers are working on a project together and need to transfer files to and from a remote system in OpenSSH. Which utility should you use?
scp
sftp
ftp
telnet
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
data structures1
Quiz
•
University
16 questions
L9 Website Maintenance and Optimization Quiz
Quiz
•
University
20 questions
Digital Forensics
Quiz
•
University
12 questions
Intro to Scratch 2
Quiz
•
KG - University
20 questions
Business Information System PreTest2
Quiz
•
University
14 questions
AZ-900 Module 1
Quiz
•
1st Grade - Professio...
19 questions
02 SO Estructura del Sistema Operativo
Quiz
•
University
22 questions
MIDTERM EXAM (STS_313)
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade