Q.1 Which one of the following feature was present in SSH protocol, version 1?
A. Password changing
B. Periodic replacement of session keys
C. Support for public-key certificates
D. None of the above
Ans : None of the above
Q.2 Types of SSH keys are?
A. RSA
B. DSA
A. ECDSA
B. All of the above
Ans : All of the above
Q.3 SSH-2 does not contain ______________.
A. transport layer
B. connection layer
A. user authentication layer
B. physical layer
Ans : physical layer
Q.4 It is possible to allow users and groups to have access to SSH server.
A. True
B. False
Ans : True
Q.5 Which one of the following authentication method is used by SSH?
A. public-key
B. host based
C. password
D. All of the above
Ans : All of the above
Q.6 which file needs to be edited to display welcome message when user login to SSH Server?
A. ‘/etc/issue’
B. ‘/etc/message’
A. ‘/etc/user’
B. All of the above
Ans : ‘/etc/issue’
Q.7 SCP protocol is evolved from __________ over SSH.
A. DHCP protocol
B. RCP protocol
C. MGCP protocol
D. GCP protocol
Ans : RCP protocol
Q.8 SSH has how many protocols?
A. 2
B. 3
C. 4
D. 8
Ans : 2
Q.9 Protocol 1 is older than protocol 2
A. True
B. False
Ans : True
Q.10 Protocol 1 is less secure than protocol 2?
A. True
B. False
Ans : True
Q.11 Protocol 1 should be disabled in the config file?
A. True
B. False
Ans : True
Q.12 where can we find the failed login attempts in the log file?
A. ‘/var/log/secure’
B. ‘/var/log/login’
C. ‘/var/log/failed’
D. None of the above
Ans : ‘/var/log/secure’
Q.13 Is it possible to copy files over SSH?
A. True
B. False
Ans : True