Preview

08 - SSH for remote management

 1. SSH stands for _______________

  secure shallow

  serial shell

  sent server

  secure shell

 2. SSH is a _________________ protocol that allows secure communication between a client and a server.

  serial access

  remote access

  public access

  standardised access

 3. To use SSH, the server must be running the SSH server program and the user has to be using the ___________________________

  SSH cable

  SSH socket

  SSH port

  SSH client

 4. In SSH, the connection is made over a ___________________on a potentially insecure network.

  shell-like port

  secure channel

  insecure cable

  shell (enclosed) socket

 5. The SSH protocol ensures that every one else in addition to the user can see the data transferred. This makes it both public and secure.
Additional information: SSH is typically used to log into a remote machine and 
execute commands, but it also supports tunneling, 
forwarding TCP ports and X11 connections; it can 
transfer files using the associated SSH files
transfer (SFTP) or secure copy (SCP) protocols.
SSH uses the client-server model.

  FALSE

  TRUE

 6. SSH is used to log in to a remote machine and ___________________________.

  delete the server in the event of a security breach or emergency

  execute commands across the server

  delete all malware - it's only capability is the handling of security issues

  execute only a shut down sequence in the case of an emergency

 7. When using SSH, the connection is made using TCP to a ________ of the server.

  IP address

  plug

  domain

  port

 8. An example of an SSH client is _________________.

  cutty

  nutty

  putty

  sutty

 9. The standard TCP port for SSH is ___ The best known example application is for remote login to computer systems by users

  12

  22

  90

  80

 10. SSH uses public-key cryptography to authenticate the remote computer and allow it to authenticate the user, if necessary
Interesting fact: The encryption used by SSH is intended to provide confidentiality 
and integrity of data over an unsecured network, such as the Internet,
 although files leaked by Edward Snowden indicate that the National 
Security Agency can sometimes decrypt SSH, allowing them to read 
the contents of SSH sessions

  FALSE

  TRUE