Linux CLI - SSH and Remote AccessWhy does SSH use public-key cryptography instead of just passwords for authentication?APasswords cannot be used with SSH.BPublic-key cryptography is more secure and avoids sending passwords over the network.CPublic keys allow anonymous login without authentication.DPasswords are faster but less secure than public keys.Check Answer
Step-by-Step SolutionSolution:Step 1: Understand SSH authentication methodsSSH supports passwords and public-key authentication.Step 2: Identify advantage of public keysPublic-key cryptography avoids sending passwords and is more secure.Final Answer:Public-key cryptography is more secure and avoids sending passwords over the network. -> Option BQuick Check:Public-key = secure authentication [OK]Quick Trick: Public keys secure SSH by avoiding password transmission [OK]Common Mistakes:Thinking passwords are faster and more secureBelieving public keys allow anonymous loginAssuming SSH cannot use passwords
Master "SSH and Remote Access" in Linux CLI9 interactive learning modes - each teaches the same concept differentlyLearnWhyDeepVisualTryChallengeProjectRecallTime
More Linux CLI Quizzes Archiving and Compression - bzip2 and xz compression - Quiz 8hard Cron and Scheduling - Editing crontab (crontab -e) - Quiz 14medium Environment and Configuration - export command - Quiz 3easy Environment and Configuration - Environment variables - Quiz 4medium Package Management - snap and flatpak - Quiz 14medium Package Management - Installing, updating, removing packages - Quiz 3easy SSH and Remote Access - tmux for persistent sessions - Quiz 6medium SSH and Remote Access - SSH tunneling (port forwarding) - Quiz 6medium System Administration - Backup strategies - Quiz 9hard System Administration - Why sysadmin skills manage production servers - Quiz 14medium