Introduction to Linux II – Chapter 19 Exam Answers 100% PDF file

How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the question is not here, find it in Questions Bank.

NOTE: If you have the new question on this test, please comment Question and Multiple-Choice list in form below this article. We will update answers for you in the shortest time. Thank you! We truly value your contribution to the website.

1. Which file is used to configure SSH clients?

  • /etc/ssh_config
  • /etc/ssh/sshd_config
  • /etc/ssh/ssh_config
  • /etc/sshd_config

2. The system has a /etc/ssh/ssh_config file and the user Mike also has a ~/.ssh/config in his home directory. Which file will be used when Mike connects to a server via SSH?

  • ~/etc/.ssh/config
  • ~/.ssh/config
  • Both files will be used
  • /etc/ssh/ssh_config

3. What does the entry AllowGroups dba netusers in the /etc/ssh/sshd_config indicate?

  • Users with usernames dba and netusers will be allowed access
  • Users who are not part of the dba and netusers groups will be allowed access
  • Users who are part of the dba and netusers groups will be allowed access
  • Users who are part of the dba and netusers groups will not be allowed access

4. Which of the following is not an authentication method supported by SSH?

  • Signature Authentication
  • Password Authentication
  • Public Key Authentication
  • Host Based Authentication

5. Which command is used to add private keys to the SSH agent’s repository?

  • ssh-agentadd
  • sshadd
  • ssh-add
  • ssh-addkey

6. The ssh-add utility can be used to add only RSA keys.
True or False?

  • True
  • False

7. SSH Tunneling is the same as _____.

  • SSH Encryption
  • SSH Port Forwarding
  • SSH Encoding
  • SSH Porting

8. Which of the following commands are used to setup SSH tunneling?

  • ssh -l
  • ssh -t
  • ssh -p
  • ssh –L

9. Which command is used to generate a GnuPG key?

  • gpg --gen-key
  • gpg -gen-key
  • gpggen --key
  • gpg-gen --key

10. Question 10The SSH and GnuPG keys can be protected by an optional passphrase.
True or False?

  • True
  • False

11. Which file on the server holds the public keys of the hosts that need to be authenticated?

  • /etc/ssh/ssh_hosts
  • /etc/ssh/ssh_hosts_known
  • ~/ssh/ssh_known_hosts
  • /etc/ssh/ssh_known_hosts

12. Which of the following utility programs are not provided by OpenSSH?

  • slogin
  • ssh
  • scp
  • smv

13. What is the function of the ssh-agent?

  • Cache the decrypted public key and provide it to client programs
  • Decrypt the private key and provide it to client programs
  • Cache the decrypted private key and provide it to client programs
  • Generate the signature using the private key

14. Which of the following commands will start a SSH session with X11 support?

  • ssh –L marks.gsource.com
  • ssh –X marks.gsource.com
  • ssh –l marks.gsource.com
  • ssh –x marks.gsource.com

15. Which of the following is not a function provided by GnuPG?

  • Accessing public keys
  • Providing encrypted channel for communication
  • Encryption
  • Digital signature

16. Which command is used to verify the signature of a package?

  • gpg --verify pkg.sig
  • gpg verify pkg.sig
  • gpg -V pkg.sig
  • gpg -v pkg.sig

17. The size of a DSA key is:

  • Exactly 1024 bits
  • Exactly 2048 bits
  • Exactly 768 bits
  • Exactly 1000 bits

18. Which of the following entries in /etc/ssh/sshd_config turn on host based authentication?

  • HostbasedAuthentication enable
  • HostbasedAuthentication: yes
  • Hostbased_Authentication yes
  • HostbasedAuthentication yes

19. The ssh-add program ran for user will, but his RSA identity files were not added, what could be the reason for this?

  • The file /home/will/.ssh/id_rsa had read and write permissions only for Will
  • The file /home/will/.ssh/id_rsa had read permissions for no other user except Will
  • The file /home/will/.ssh/id_rsa has read permissions only for Will
  • The file /home/will/.ssh/id_rsa has read permissions for users other than Will

20. Which standard is GnuPG based on?

  • Unix Good Privacy (UGP)
  • SSH Good Privacy (SGP)
  • Pretty Good Privacy (PGP)
  • Linux Good Privacy (LGP)

21. What is the limitation of telnet from the security perspective?

  • Does not provide the algorithm to decrypt the usernames and passwords
  • Adds digital signatures to authentication data
  • Sends all data including usernames and passwords in clear text
  • Does not compress the data

22. What does the ~/.ssh/id_rsa file contain?

  • RSA public signature of the user
  • RSA private key of the user
  • RSA private signature of the user
  • RSA public key of the user

23. The gpg command operates in a ____ mode.

  • verbose
  • batch
  • interactive
  • silent

24. Which of the following algorithms are not supported by GnuPG for key generation?

  • DSA
  • RSA
  • Elgamal
  • One-way Hash

25. The SSH utility is provided by the OpenSSH package.
True or False?

  • True
  • False

26. Which of the following entries in /etc/ssh/sshd_config turn on SSH tunneling?

  • AllowTcpPortForwarding yes
  • AllowPortForwarding yes
  • AllowTcpForwarding yes
  • AllowTCPIPForwarding yes

27. Which is the default configuration file used by GnuPG?

  • ~/gnupg/gpg.conf
  • ~/.gnupg/.gpg.conf
  • ~/.gnupg/gpg.conf
  • ~/.gnu/gpg.conf

28. The _____ command is used to generate SSH keys.

  • sshkey-gen
  • ssh-genkey
  • ssh-keygen
  • sshgen-key

Download PDF File below:

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x