Linux - SSH Quiz

Linux - SSH Quiz

Professional Development

•

30 Qs

quiz-placeholder

Similar activities

Introduction to AIoT Topics

Introduction to AIoT Topics

Professional Development

•

30 Qs

API. REST. HTTP. SQL

API. REST. HTTP. SQL

Professional Development

•

30 Qs

Cybersecurity Assessment

Cybersecurity Assessment

Professional Development

•

25 Qs

Soal Pilihan Ganda Sistem Operasi

Soal Pilihan Ganda Sistem Operasi

Professional Development

•

25 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Professional Development

•

25 Qs

WordPad – MCQ Question Paper

WordPad – MCQ Question Paper

Professional Development

•

25 Qs

CBE Pretest

CBE Pretest

Professional Development

•

25 Qs

Quiz Pemrograman Web

Quiz Pemrograman Web

Professional Development

•

30 Qs

Linux - SSH Quiz

Linux - SSH Quiz

Assessment

Quiz

•

Information Technology (IT)

•

Professional Development

•

Practice Problem

•

Easy

Created by

Nafish Alam

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which port does SSH use by default?

80

22

443

3389

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following tools is NOT GUI-based for remote access?

AnyDesk

TeamViewer

Telnet

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of SSH?

Data encryption for websites

Remote Login and Command Execution

File compression

Streaming multimedia

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component of SSH verifies the client’s identity using a private key?

SSH Client

SSH Server

Authentication Protocol

Network Router

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a security feature of SSH?

Compression

Authentication

Broadcasting

File editing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a drawback of Password Authentication in SSH?

Requires installation

Less secure due to vulnerability to brute-force attacks

Cannot be used for remote login

High computational requirements

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication method is most resistant to brute-force attacks?

Password Authentication

Public Key Authentication

Host-Based Authentication

GSSAPI Authentication

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?