Podcast
Questions and Answers
What primary encryption technique does SSH use to ensure secure communication?
What primary encryption technique does SSH use to ensure secure communication?
- Symmetric cryptography only
- Hashing algorithms
- Steganography
- Public-key cryptography (correct)
Which of the following is NOT a function of SSH?
Which of the following is NOT a function of SSH?
- Secure tunnelling
- Bandwidth throttling (correct)
- Secure file transfer
- Remote system management
Which SSH feature allows for automation of repetitive administrative tasks?
Which SSH feature allows for automation of repetitive administrative tasks?
- SSH scripting (correct)
- Password authentication
- Secure tunnelling
- Public-key exchange
What main advantage does SSH provide over Telnet?
What main advantage does SSH provide over Telnet?
Which software is primarily used for SSH on Windows systems?
Which software is primarily used for SSH on Windows systems?
What is the purpose of using secure tunnels in SSH?
What is the purpose of using secure tunnels in SSH?
Which authentication method offers an extra layer of security in SSH?
Which authentication method offers an extra layer of security in SSH?
How can SSH be configured on Windows?
How can SSH be configured on Windows?
Which protocol provides secure data transfer through strong encryption?
Which protocol provides secure data transfer through strong encryption?
What is the default port used by SSH?
What is the default port used by SSH?
Which of the following is a stronger authentication method utilized by SSH?
Which of the following is a stronger authentication method utilized by SSH?
Which feature is NOT supported by SSH?
Which feature is NOT supported by SSH?
What type of transfer is associated with Telnet?
What type of transfer is associated with Telnet?
Which of the following reflects the flexibility of SSH compared to Telnet?
Which of the following reflects the flexibility of SSH compared to Telnet?
Which statement is true about data transfer in Telnet?
Which statement is true about data transfer in Telnet?
Which statement is correct regarding scripting capabilities?
Which statement is correct regarding scripting capabilities?
What is one of the encryption technologies used by SSH?
What is one of the encryption technologies used by SSH?
Which command allows a user to connect to a remote host using SSH?
Which command allows a user to connect to a remote host using SSH?
What is the primary function of a firewall in a network?
What is the primary function of a firewall in a network?
What is an example of how SSH can be used from the command line?
What is an example of how SSH can be used from the command line?
Which of the following best describes a firewall?
Which of the following best describes a firewall?
What can happen if an internal network is connected directly to the Internet without a firewall?
What can happen if an internal network is connected directly to the Internet without a firewall?
Which of the following is NOT a type of encryption used by SSH?
Which of the following is NOT a type of encryption used by SSH?
What precaution is essential for proper network security when using a firewall?
What precaution is essential for proper network security when using a firewall?
Flashcards are hidden until you start studying
Study Notes
SSH Overview
- OpenSSH is the most common open-source implementation of SSH found on Linux, Unix, and BSD-based operating systems, including macOS.
- On Windows, OpenSSH is not enabled by default and must be activated via the Windows Settings app.
- PuTTY is another popular open-source SSH client originally designed for Windows but now available for multiple platforms including macOS and Unix/BSD.
Reasons for Using SSH
- Strong Authentication: Supports various methods including passwords and public-key cryptography for enhanced security.
- Secure File Transfer: Provides encrypted file transfer capabilities, ensuring sensitive data remains secure from interception.
- Secure Tunneling: Allows the creation of secure tunnels for running insecure protocols over unencrypted networks, such as FTP.
- Automated Tasks: Scripting through SSH enables administrators to automate repetitive tasks efficiently.
- Flexibility: Offers a powerful command-line interface for managing files, users, and services, surpassing the limitations of Telnet.
SSH vs Telnet
- Security:
- Telnet is unsecured with no encryption.
- SSH employs strong encryption for secure communication.
- Port:
- Telnet operates on port 23.
- SSH uses port 22 by default.
- Authentication:
- Telnet relies on basic username/password authentication.
- SSH supports stronger authentication through keys as well.
- Data Transfer:
- Telnet transfers data in plaintext.
- SSH uses encryption for secure data transfer.
- Multi-factor Authentication: Not supported in Telnet, while SSH supports it.
- File Transfer: Telnet's transfer is insecure; SSH ensures secure file transfers.
- Scripting Capabilities: Telnet has limited scripting; SSH offers extensive scripting functionalities.
- Flexibility: Telnet provides limited functionalities compared to SSH's powerful command-line interface.
SSH Encryption Methods
- Symmetrical Encryption: Uses the same key for both encryption and decryption.
- Asymmetrical Encryption: Utilizes a pair of keys (public and private) for secure communication.
- Hashing: Provides data integrity by generating a fixed-size hash value from data.
Basic SSH Commands
- Use the command format
ssh username@hostname
to connect to a remote server. - Upon connecting, a password prompt appears for the remote user account.
- To run a single command on a remote host and exit, use
ssh username@hostname 'command'
(e.g., listing directory contents usingls
).
Firewalls
- A firewall is a critical network device or host with multiple network interfaces, controlling access between protected internal networks and external unprotected networks like the Internet.
- It acts as a security barrier, preventing unauthorized access while safeguarding sensitive internal data and software.
- Direct connection of internal networks to the Internet necessitates rigorous security, as a single error can compromise the entire network.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.