A. Secure data communication
B. Remote command-line login
C. Remote command execution
D. All of the mentioned
Explanation: SSH provides high encryption and security features while communicating through a network. It is a cryptographic network protocol.
A. Unix-like operating systems
B. Windows
C. Both unix-like and windows systems
D. None of the mentioned
Explanation: SSH isn’t confined to a certain network or operating system. It can be implemented over different networks and on different operating systems.
A. Public-key cryptography
B. Private-key cryptography
C. Any of public-key or private-key
D. Both public-key & private-key
Explanation: Public encryption key is slower but more flexible. Every cryptographic security system requires a private key for private access and a public key for location.
A. Port 21
B. Port 22
C. Port 23
D. Port 24
Explanation: Port 22 is used for contacting ssh servers, used for file transfers (scp, sftp) and also port forwarding.
A. Telnet
B. Rlogin
C. Both telnet and rlogin
D. None of the mentioned
Explanation: SSH is more secured then telnet and rlogin.
A. Scp
B. Sftp
C. Rsync
D. All of the mentioned
Explanation: SCP (Secure copy protocol), SFTP (SSH File Transfer Protocol) and Rsync all are file transfer protocols which are used by SSH.
A. Transport layer
B. User authentication layer
C. Physical layer
D. Connection layer
Explanation: SSH2 is a more secure, portable and efficient version of SSH that includes SFTP, which is functionally similar to FTP, but is SSH2 encrypted.
A. Password changing
B. Periodic replacement of session keys
C. Support for public-key certificates
D. None of the mentioned
Explanation: All of the mentioned features are provided by SSH-2 and that SSH-1 only provide strong authentication and guarantee confidentiality.
A. Rcp protocol
B. DHCP protocol
C. Mgcp protocol
D. Gcp protocol
Explanation: RCP is the abbreviation for Rate Control Protocol is a congestion control algorithm for fast user response times.
A. Public-key
B. Host based
C. Password
D. All of the mentioned
Explanation: SSH used public key authentication, Password authentication, Host based authentication, keyboard authentication and authentication of servers.