Preview

08 - SSH for remote management

 1. SSH stands for _______________

  secure shallow

  serial shell

  sent server

  secure shell

 2. SSH is a _________________ protocol that allows secure communication between a client and a server.

  remote access

  public access

  serial access

  standardised access

 3. To use SSH, the server must be running the SSH server program and the user has to be using the ___________________________

  SSH client

  SSH port

  SSH socket

  SSH cable

 4. In SSH, the connection is made over a ___________________on a potentially insecure network.

  insecure cable

  shell-like port

  shell (enclosed) socket

  secure channel

 5. The SSH protocol ensures that every one else in addition to the user can see the data transferred. This makes it both public and secure.
Additional information: SSH is typically used to log into a remote machine and 
execute commands, but it also supports tunneling, 
forwarding TCP ports and X11 connections; it can 
transfer files using the associated SSH files
transfer (SFTP) or secure copy (SCP) protocols.
SSH uses the client-server model.

  FALSE

  TRUE

 6. SSH is used to log in to a remote machine and ___________________________.

  execute commands across the server

  execute only a shut down sequence in the case of an emergency

  delete the server in the event of a security breach or emergency

  delete all malware - it's only capability is the handling of security issues

 7. When using SSH, the connection is made using TCP to a ________ of the server.

  IP address

  plug

  domain

  port

 8. An example of an SSH client is _________________.

  putty

  cutty

  nutty

  sutty

 9. The standard TCP port for SSH is ___ The best known example application is for remote login to computer systems by users

  90

  12

  80

  22

 10. SSH uses public-key cryptography to authenticate the remote computer and allow it to authenticate the user, if necessary
Interesting fact: The encryption used by SSH is intended to provide confidentiality 
and integrity of data over an unsecured network, such as the Internet,
 although files leaked by Edward Snowden indicate that the National 
Security Agency can sometimes decrypt SSH, allowing them to read 
the contents of SSH sessions

  TRUE

  FALSE