Linux - SSH Quiz

Linux - SSH Quiz

Professional Development

30 Qs

quiz-placeholder

Similar activities

CLF-C02 - Sim. 28 Questões Semana 3 - AWS Cloud Pratiticioner

CLF-C02 - Sim. 28 Questões Semana 3 - AWS Cloud Pratiticioner

Professional Development

28 Qs

Paid Class Cybersecurity Quiz

Paid Class Cybersecurity Quiz

Professional Development

32 Qs

Digital Classroom - Architecting on AWS - Módulos 5-7

Digital Classroom - Architecting on AWS - Módulos 5-7

Professional Development

25 Qs

Protocols

Protocols

Professional Development

35 Qs

Day 8 1201 Review

Day 8 1201 Review

Professional Development

33 Qs

Windows and Azure Security Quiz

Windows and Azure Security Quiz

Professional Development

30 Qs

AWS DVA-C02 Quiz by CAAI

AWS DVA-C02 Quiz by CAAI

Professional Development

25 Qs

DP-300 Full MCQ Set

DP-300 Full MCQ Set

Professional Development

31 Qs

Linux - SSH Quiz

Linux - SSH Quiz

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

Nafish Alam

Used 3+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which port does SSH use by default?

80

22

443

3389

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following tools is NOT GUI-based for remote access?

AnyDesk

TeamViewer

Telnet

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of SSH?

Data encryption for websites

Remote Login and Command Execution

File compression

Streaming multimedia

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component of SSH verifies the client’s identity using a private key?

SSH Client

SSH Server

Authentication Protocol

Network Router

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a security feature of SSH?

Compression

Authentication

Broadcasting

File editing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a drawback of Password Authentication in SSH?

Requires installation

Less secure due to vulnerability to brute-force attacks

Cannot be used for remote login

High computational requirements

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication method is most resistant to brute-force attacks?

Password Authentication

Public Key Authentication

Host-Based Authentication

GSSAPI Authentication

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?