---Advertisement---
Application Layer Computer Science Engineering OSI Model SSH

SSH Interview/Exam Question-Answer

By smart_answer13

Published on:

---Advertisement---

Q.1 SSH can be used in only _____________.

       A. windows

       B. unix-like operating systems

       C. both unix-like and windows systems

       D. None of the above

Ans : both unix-like and windows systems


Q.2 By Default, Which port number is used to configured SSH?

       A. Port 22

       B. Port 23

       A. Port 21

       B. None of the above

Ans : Port 22


Q.3 Secure shell (SSH) network protocol is used for __________.

       A. Remote command-line login

       B. Remote command execution

       A. Secure data communication

       B. All of the above

Ans : All of the above


Q.4 Where we can change or set the port number for SSH?

       A. Configuration file

       B. Remote File

       C. Base file

       D. All of the above

Ans : Configuration file


Q.5 Which standard TCP port is assigned for contacting SSH servers?

       A. Port 10

       B. Port 80

       C. Port 22

       D. Port 23

Ans : Port 22


Q.6 Need to change the parameter PermitRootLogin to No in the configuration file to disable direct root login.

       A. True

       B. False

Ans : True


Q.7 SSH uses ___________ to authenticate the remote computer.

       A. public-key cryptography

       B. private-key cryptography

       C. any of public-key or private-key

       D. both public-key & private-key

Ans : public-key cryptography


Q.8 Which Network protocol is used to connect/communicate with another machine over network?

       A. SSH

       B. Telnet

       C. Both Telnet or SSH

       D. None of the above

Ans : Both Telnet or SSH


Q.9 Which one of the following is a file transfer protocol using SSH?

       A. SFTP

       B. SCP

       C. Rsync

       D. All of the above

Ans : All of the above


Q.10 Is it possible to login to SSH server without password?

       A. True

       B. False

Ans : True


Q.11 Which one of the following protocol can be used for login to a shell on a remote host except SSH?

       A. rlogin

       B. telnet

       C. both telnet and rlogin

       D. None of the above

Ans : both telnet and rlogin


Q.12 Which technology to create public and private keys?

       A. ssh-keygen

       B. ssh-rsa

       C. ssh-ecdsa

       D. None of the above

Ans : ssh-keygen


SSH

smart_answer13

---Advertisement---

Related Post

Operating System Processes MCQ (Interview-Exam) Question-Answer

Q.1 To access the services of operating system, the interface is provided by the ___________.        A. API        B. Assembly instructions     ...

Operating System MCQ Question-Answer Part 4

Q.1 What is an operating system?        A. System service provider to the application programs        B. Interface between the hardware and application programs ...

AH and ESP Protocols Interview/Exam Question-Answer

Q.1 Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?        A. SHA        B. Kerberos ...

UDP Interview/Exam Question-Answer

Q.1 Return value of the UDP port “Chargen” is _______.        A. String of integers        B. String of characters        C. ...

Leave a Comment