System Administrator 2026
Secure shell (SSH) network protocol is used for __________
  • A. Secure data communication
  • B. Remote command-line login
  • C. Remote command execution
  • D. All of the mentioned
SSH can be used in only _____________
  • A. Unix-like operating systems
  • B. Windows
  • C. Both unix-like and windows systems
  • D. None of the mentioned
SSH uses ___________ to authenticate the remote computer.
  • A. Public-key cryptography
  • B. Private-key cryptography
  • C. Any of public-key or private-key
  • D. Both public-key & private-key
Which standard TCP port is assigned for contacting SSH servers?
  • A. Port 21
  • B. Port 22
  • C. Port 23
  • D. Port 24
Which one of the following protocol can be used for login to a shell on a remote host except SSH?
  • A. Telnet
  • B. Rlogin
  • C. Both telnet and rlogin
  • D. None of the mentioned
Which one of the following is a file transfer protocol using SSH?
  • A. Scp
  • B. Sftp
  • C. Rsync
  • D. All of the mentioned
SSH-2 does not contain ______________
  • A. Transport layer
  • B. User authentication layer
  • C. Physical layer
  • D. Connection layer
Which one of the following feature was present in SSH protocol, version 1?
  • A. Password changing
  • B. Periodic replacement of session keys
  • C. Support for public-key certificates
  • D. None of the mentioned
SCP protocol is evolved from __________ over SSH.
  • A. Rcp protocol
  • B. DHCP protocol
  • C. Mgcp protocol
  • D. Gcp protocol
Which one of the following authentication method is used by SSH?
  • A. Public-key
  • B. Host based
  • C. Password
  • D. All of the mentioned