Thursday 19 November 2015

IBPS IT SO- Computer Networks - SSH

SSH
1. Secure shell (SSH) network protocol is used for
a) secure data communication
b) remote command-line login
c) remote command execution
d) all of the mentioned

Answer:d
Explanation:None.
2. SSH can be used in only
a) unix-like operating systems
b) windows
c) both (a) and (b)
d) none of the mentioned

Answer:c
Explanation:None.
3. SSH uses _______ to authenticate the remote computer.
a) public-key cryptography
b) private-key cryptography
c) both (a) and (b)
d) none of the mentioned

Answer:a
Explanation:None.
4. Which standard TCP port is assigned for contacting SSH servers?
a) port 21
b) port 22
c) port 23
d) port 24

Answer:b
Explanation:None.
5. Which one of the following protocol can be used for login to a shell on a remote host except SSH?
a) telnet
b) rlogin
c) both (a) and (b)
d) none of the mentioned

Answer:c
Explanation:SSH is more secured then telnet and rlogin.
6. Which one of the following is a file transfer protocol using SSH?
a) SCP
b) SFTP
c) rsync
d) all of the mentioned

Answer:d
Explanation:None.
7. SSH-2 does not contain
a) transport layer
b) user authentication layer
c) physical layer
d) connection layer

Answer:c
Explanation:None.
8. Which one of the following feature was present in SSH protocol, version 1?
a) password changing
b) periodic replacement of session keys
c) support for public-key certificates
d) none of the mentioned

Answer:d
Explanation:None.
9. SCP protocol is evolved from _____ over SSH.
a) RCP protocol
b) DHCP protocol
c) MGCP protocol
d) none of the mentioned

Answer:a
Explanation:None.
10. Which one of the following authentication method is used by SSH?
a) public-key
b) host based
c) password
d) all of the mentioned

Answer:d
Explanation:None.



All the best for your exams @Mission IT SO 2016

No comments:

Post a Comment