SSH Remote Access


Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

SSH uses _____ cryptography to ensure authentication and security.

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. When two systems first connect using SSH they exchange their _____ keys with each other.

2. SSH uses a client-server model. That means that a _____ requests a connection, and the _____ accepts or rejects it.

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

These questions will help you find out how much you know about SSH server access. You will be asked about a type of encryption as well as the history of SSH.

Quiz & Worksheet Goals

In this assessment, you'll test your understanding of:

  • What type of encryption SSH uses
  • What kind of key two different servers first exchange
  • What the official version of SSH adopted in 2006 is called

Skills Practiced

  • Reading comprehension - ensure that you draw the most important information from the material, such as what type of encryption SSH uses
  • Information recall - access the knowledge you've gained regarding which operating systems include SSH by default
  • Knowledge application - use your knowledge to answer questions about the kind of key servers would first exchange when using SSH

Additional Learning

For a more in depth understanding of SSH, read the lesson titled, SSH Remote Access. Topics covered will include:

  • When SSH was originally developed
  • What SCP does
  • How users can access servers using SSH