Linux - SSH Quiz

Linux - SSH Quiz

Professional Development

30 Qs

quiz-placeholder

Similar activities

Python Programming Quiz 1

Python Programming Quiz 1

Professional Development

30 Qs

Net+ day 5

Net+ day 5

Professional Development

25 Qs

Python Basics quiz

Python Basics quiz

Professional Development

25 Qs

Post Test Bimtek Penanganan Insiden Siber  Kabupaten Tangerang

Post Test Bimtek Penanganan Insiden Siber Kabupaten Tangerang

Professional Development

25 Qs

Network and Security Quiz

Network and Security Quiz

Professional Development

25 Qs

LH Active L1: Outbound Review

LH Active L1: Outbound Review

Professional Development

25 Qs

ALTSCHOOL QUIZ 13/9/25

ALTSCHOOL QUIZ 13/9/25

Professional Development

25 Qs

Bendy and the ink machine

Bendy and the ink machine

Professional Development

26 Qs

Linux - SSH Quiz

Linux - SSH Quiz

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

Nafish Alam

Used 3+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which port does SSH use by default?

80

22

443

3389

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following tools is NOT GUI-based for remote access?

AnyDesk

TeamViewer

Telnet

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of SSH?

Data encryption for websites

Remote Login and Command Execution

File compression

Streaming multimedia

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component of SSH verifies the client’s identity using a private key?

SSH Client

SSH Server

Authentication Protocol

Network Router

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a security feature of SSH?

Compression

Authentication

Broadcasting

File editing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a drawback of Password Authentication in SSH?

Requires installation

Less secure due to vulnerability to brute-force attacks

Cannot be used for remote login

High computational requirements

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication method is most resistant to brute-force attacks?

Password Authentication

Public Key Authentication

Host-Based Authentication

GSSAPI Authentication

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?