Linux - SSH Quiz

Linux - SSH Quiz

Professional Development

30 Qs

quiz-placeholder

Similar activities

CCSA-2

CCSA-2

Professional Development

30 Qs

API. REST. HTTP. SQL

API. REST. HTTP. SQL

Professional Development

30 Qs

CCSE-1

CCSE-1

Professional Development

30 Qs

ATTACK CONCEPTS  AND  TECHNIQUES!

ATTACK CONCEPTS AND TECHNIQUES!

Professional Development

35 Qs

AMAZON WEB SERVICES

AMAZON WEB SERVICES

Professional Development

30 Qs

Linux

Linux

Professional Development

27 Qs

BTUI'24 - Inter-school ICT Quiz - Preliminary Round

BTUI'24 - Inter-school ICT Quiz - Preliminary Round

Professional Development

30 Qs

Chapter-1- Introduction to Web Development

Chapter-1- Introduction to Web Development

Professional Development

25 Qs

Linux - SSH Quiz

Linux - SSH Quiz

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

Nafish Alam

Used 3+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which port does SSH use by default?

80

22

443

3389

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following tools is NOT GUI-based for remote access?

AnyDesk

TeamViewer

Telnet

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of SSH?

Data encryption for websites

Remote Login and Command Execution

File compression

Streaming multimedia

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component of SSH verifies the client’s identity using a private key?

SSH Client

SSH Server

Authentication Protocol

Network Router

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a security feature of SSH?

Compression

Authentication

Broadcasting

File editing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a drawback of Password Authentication in SSH?

Requires installation

Less secure due to vulnerability to brute-force attacks

Cannot be used for remote login

High computational requirements

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication method is most resistant to brute-force attacks?

Password Authentication

Public Key Authentication

Host-Based Authentication

GSSAPI Authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?