SSH
1. Secure
shell (SSH) network protocol is used for
a) secure data communication
b) remote command-line login
c) remote command execution
d) all of the mentioned
a) secure data communication
b) remote command-line login
c) remote command execution
d) all of the mentioned
Answer:d
Explanation:None.
Explanation:None.
2. SSH can be used in
only
a) unix-like operating systems
b) windows
c) both (a) and (b)
d) none of the mentioned
a) unix-like operating systems
b) windows
c) both (a) and (b)
d) none of the mentioned
Answer:c
Explanation:None.
Explanation:None.
3. SSH uses _______
to authenticate the remote computer.
a) public-key cryptography
b) private-key cryptography
c) both (a) and (b)
d) none of the mentioned
a) public-key cryptography
b) private-key cryptography
c) both (a) and (b)
d) none of the mentioned
Answer:a
Explanation:None.
Explanation:None.
4. Which standard TCP
port is assigned for contacting SSH servers?
a) port 21
b) port 22
c) port 23
d) port 24
a) port 21
b) port 22
c) port 23
d) port 24
Answer:b
Explanation:None.
Explanation:None.
5. Which one of the
following protocol can be used for login to a shell on a remote host except
SSH?
a) telnet
b) rlogin
c) both (a) and (b)
d) none of the mentioned
a) telnet
b) rlogin
c) both (a) and (b)
d) none of the mentioned
Answer:c
Explanation:SSH is more secured then telnet and rlogin.
Explanation:SSH is more secured then telnet and rlogin.
6. Which one of the
following is a file transfer protocol using SSH?
a) SCP
b) SFTP
c) rsync
d) all of the mentioned
a) SCP
b) SFTP
c) rsync
d) all of the mentioned
Answer:d
Explanation:None.
Explanation:None.
7. SSH-2 does not
contain
a) transport layer
b) user authentication layer
c) physical layer
d) connection layer
a) transport layer
b) user authentication layer
c) physical layer
d) connection layer
Answer:c
Explanation:None.
Explanation:None.
8. Which one of the
following feature was present in SSH protocol, version 1?
a) password changing
b) periodic replacement of session keys
c) support for public-key certificates
d) none of the mentioned
a) password changing
b) periodic replacement of session keys
c) support for public-key certificates
d) none of the mentioned
Answer:d
Explanation:None.
Explanation:None.
9. SCP protocol is
evolved from _____ over SSH.
a) RCP protocol
b) DHCP protocol
c) MGCP protocol
d) none of the mentioned
a) RCP protocol
b) DHCP protocol
c) MGCP protocol
d) none of the mentioned
Answer:a
Explanation:None.
Explanation:None.
10. Which one of the
following authentication method is used by SSH?
a) public-key
b) host based
c) password
d) all of the mentioned
a) public-key
b) host based
c) password
d) all of the mentioned
Answer:d
Explanation:None.
Explanation:None.
All the best for your exams @Mission IT SO 2016
No comments:
Post a Comment