Linux - SSH Quiz

Linux - SSH Quiz

Professional Development

•

30 Qs

quiz-placeholder

Similar activities

NSDA CO L3 (701-727)

NSDA CO L3 (701-727)

Professional Development

•

27 Qs

AWS Services Worksheet

AWS Services Worksheet

Professional Development

•

28 Qs

Puzl Tech Halloween

Puzl Tech Halloween

Professional Development

•

26 Qs

Course 14_PTI_Quiz

Course 14_PTI_Quiz

Professional Development

•

25 Qs

MCyber_Chap12N13

MCyber_Chap12N13

Professional Development

•

25 Qs

FANUC Certification Practice Test

FANUC Certification Practice Test

Professional Development

•

25 Qs

CCPS Day 2 - Latihan

CCPS Day 2 - Latihan

Professional Development

•

25 Qs

Digital Literacy

Digital Literacy

Professional Development

•

26 Qs

Linux - SSH Quiz

Linux - SSH Quiz

Assessment

Quiz

•

Information Technology (IT)

•

Professional Development

•

Practice Problem

•

Easy

Created by

Nafish Alam

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which port does SSH use by default?

80

22

443

3389

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following tools is NOT GUI-based for remote access?

AnyDesk

TeamViewer

Telnet

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of SSH?

Data encryption for websites

Remote Login and Command Execution

File compression

Streaming multimedia

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component of SSH verifies the client’s identity using a private key?

SSH Client

SSH Server

Authentication Protocol

Network Router

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a security feature of SSH?

Compression

Authentication

Broadcasting

File editing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a drawback of Password Authentication in SSH?

Requires installation

Less secure due to vulnerability to brute-force attacks

Cannot be used for remote login

High computational requirements

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication method is most resistant to brute-force attacks?

Password Authentication

Public Key Authentication

Host-Based Authentication

GSSAPI Authentication

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?