Quiz-summary
0 of 28 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
Information
Because of some problems with how to create an Test Online, we temporarily use the symbol (\) instead of the symbol (/) in some sentences. So you need to change the symbol (\)to the symbol (/) when you do it in practice. Thank you!
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 28 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- Answered
- Review
-
Question 1 of 28
1. Question
1 pointsWhich file is used to configure SSH clients?Correct
Incorrect
-
Question 2 of 28
2. Question
1 pointsThe system has a \etc\ssh\ssh_config file and the user Mike also has a ~\.ssh\config in his home directory. Which file will be used when Mike connects to a server via SSH?Correct
Incorrect
-
Question 3 of 28
3. Question
1 pointsWhat does the entry AllowGroups dba netusers in the \etc\ssh\sshd_config indicate?Correct
Incorrect
-
Question 4 of 28
4. Question
1 pointsWhich of the following is not an authentication method supported by SSH?Correct
Incorrect
-
Question 5 of 28
5. Question
1 pointsWhich command is used to add private keys to the SSH agent’s repository?Correct
Incorrect
-
Question 6 of 28
6. Question
1 pointsThe ssh-add utility can be used to add only RSA keys. True or False?Correct
Incorrect
-
Question 7 of 28
7. Question
1 pointsSSH Tunneling is the same as _____.Correct
Incorrect
-
Question 8 of 28
8. Question
1 pointsWhich of the following commands are used to setup SSH tunneling?Correct
Incorrect
-
Question 9 of 28
9. Question
1 pointsWhich command is used to generate a GnuPG key?Correct
Incorrect
-
Question 10 of 28
10. Question
1 pointsQuestion 10The SSH and GnuPG keys can be protected by an optional passphrase. True or False?Correct
Incorrect
-
Question 11 of 28
11. Question
1 pointsWhich file on the server holds the public keys of the hosts that need to be authenticated?Correct
Incorrect
-
Question 12 of 28
12. Question
1 pointsWhich of the following utility programs are not provided by OpenSSH?Correct
Incorrect
-
Question 13 of 28
13. Question
1 pointsWhat is the function of the ssh-agent?Correct
Incorrect
-
Question 14 of 28
14. Question
1 pointsWhich of the following commands will start a SSH session with X11 support?Correct
Incorrect
-
Question 15 of 28
15. Question
1 pointsWhich of the following is not a function provided by GnuPG?Correct
Incorrect
-
Question 16 of 28
16. Question
1 pointsWhich command is used to verify the signature of a package?Correct
Incorrect
-
Question 17 of 28
17. Question
1 pointsThe size of a DSA key is:Correct
Incorrect
-
Question 18 of 28
18. Question
1 pointsWhich of the following entries in \etc\ssh\sshd_config turn on host based authentication?Correct
Incorrect
-
Question 19 of 28
19. Question
1 pointsThe ssh-add program ran for user will, but his RSA identity files were not added, what could be the reason for this?Correct
Incorrect
-
Question 20 of 28
20. Question
1 pointsWhich standard is GnuPG based on?Correct
Incorrect
-
Question 21 of 28
21. Question
1 pointsWhat is the limitation of telnet from the security perspective?Correct
Incorrect
-
Question 22 of 28
22. Question
1 pointsWhat does the ~\.ssh\id_rsa file contain?Correct
Incorrect
-
Question 23 of 28
23. Question
1 pointsThe gpg command operates in a ____ mode.Correct
Incorrect
-
Question 24 of 28
24. Question
1 pointsWhich of the following algorithms are not supported by GnuPG for key generation?Correct
Incorrect
-
Question 25 of 28
25. Question
1 pointsThe SSH utility is provided by the OpenSSH package. True or False?Correct
Incorrect
-
Question 26 of 28
26. Question
1 pointsWhich of the following entries in \etc\ssh\sshd_config turn on SSH tunneling?Correct
Incorrect
-
Question 27 of 28
27. Question
1 pointsWhich is the default configuration file used by GnuPG?Correct
Incorrect
-
Question 28 of 28
28. Question
1 pointsThe _____ command is used to generate SSH keys.Correct
Incorrect