Computer Networks » Ssh
Secure shell (SSH) network protocol is used for __________
A. Secure data communication
B. Remote command-line login
C. Remote command execution
D. All of the mentioned
Read more about this MCQ
SSH can be used in only _____________
A. Unix-like operating systems
B. Windows
C. Both unix-like and windows systems
D. None of the mentioned
Read more about this MCQ
SSH uses ___________ to authenticate the remote computer.
A. Public-key cryptography
B. Private-key cryptography
C. Any of public-key or private-key
D. Both public-key & private-key
Read more about this MCQ
SSH-2 does not contain ______________
A. Transport layer
B. User authentication layer
C. Physical layer
D. Connection layer
Read more about this MCQ
Which one of the following feature was present in SSH protocol, version 1?
A. Password changing
B. Periodic replacement of session keys
C. Support for public-key certificates
D. None of the mentioned
Read more about this MCQ
SCP protocol is evolved from __________ over SSH.
A. Rcp protocol
B. DHCP protocol
C. Mgcp protocol
D. Gcp protocol
Read more about this MCQ
Which one of the following authentication method is used by SSH?
A. Public-key
B. Host based
C. Password
D. All of the mentioned
Read more about this MCQ