
Secure Shell (SSH) and Telnet
Quiz by Talent
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
20 questions
Show answers
- Q1Which protocol is more secure for remote command line access, SSH or Telnet?FTPSSHHTTPTelnet30s
- Q2What is one key feature that differentiates SSH from Telnet?File transferEmail forwardingData encryptionGraphical interface30s
- Q3Which port does the SSH protocol commonly use?2221238030s
- Q4Which command is used to start an SSH session in a terminal?loginsshconnecttelnet30s
- Q5What is the main purpose of SSH authentication keys?To enhance security by replacing passwordsTo enable graphical user interfacesTo increase connection speedTo facilitate file sharing30s
- Q6Which of the following protocols does NOT provide encryption for data transmission?HTTPSSSHSFTPTelnet30s
- Q7What type of attack can SSH help mitigate compared to Telnet?EavesdroppingPhishingMalwareDenial of Service30s
- Q8Which command would you use to copy files securely over SSH?ftprsyncscpcp30s
- Q9What feature does SSH provide that allows secure access without exposing the server to the public internet?Web hostingDatabase managementVirtual machinesPort forwarding30s
- Q10What is the primary reason to avoid using Telnet for remote access?Lack of encryptionComplexity of setupLimited functionalityHigh latency30s
- Q11Which protocol provides a secure, encrypted channel for remote administration of computers?FTPTelnetSecure Shell (SSH)HTTP30s
- Q12What is a major security issue with using Telnet compared to SSH?It is faster than SSHIt uses encryptionData is transmitted in plaintextIt supports file transfers30s
- Q13Which command is typically used to initiate an SSH connection?pingsshftptelnet30s
- Q14Which of the following is a key feature of SSH that Telnet does not provide?Session loggingFile transferGraphical user interfaceEncryption30s
- Q15What type of authentication does SSH commonly support for improved security?Two-factor authentication onlyPublic key authenticationBiometric authentication onlyPassword only30s