Recall & Review
beginner
What does SSH stand for and what is its main purpose?
SSH stands for Secure Shell. It is used to securely connect to a remote computer over a network, allowing you to control it as if you were sitting in front of it.
Click to reveal answer
beginner
What is the basic command syntax to connect to a remote server using SSH?
The basic command is
ssh username@hostname. Here, username is your user on the remote machine, and hostname is the server's address or IP.Click to reveal answer
beginner
Why is SSH considered secure compared to older methods like Telnet?
SSH encrypts all data sent between your computer and the remote server, protecting passwords and commands from being seen by others on the network.
Click to reveal answer
intermediate
What is the purpose of SSH keys in connection?
SSH keys are pairs of cryptographic keys used to authenticate without typing a password. The private key stays on your computer, and the public key is placed on the server.
Click to reveal answer
beginner
How can you specify a different port number when connecting with SSH?
Use the
-p option followed by the port number, like ssh -p 2222 username@hostname if the server uses a port other than the default 22.Click to reveal answer
What default port does SSH use to connect to a server?
✗ Incorrect
SSH uses port 22 by default for secure connections.
Which command would you use to connect to user 'alice' on server 'example.com'?
✗ Incorrect
The correct syntax is ssh username@hostname, so ssh alice@example.com is correct.
What does SSH encrypt during a connection?
✗ Incorrect
SSH encrypts all data sent between client and server, including commands and passwords.
How do SSH keys improve security?
✗ Incorrect
SSH keys replace passwords with cryptographic keys, making authentication more secure.
Which option lets you connect to a non-default SSH port?
✗ Incorrect
The -p option specifies the port number for SSH connections.
Explain how you would connect to a remote server using SSH and what information you need.
Think about the command format and what identifies the remote machine and user.
You got /4 concepts.
Describe why SSH is a secure way to connect to remote computers compared to older methods.
Focus on what SSH protects during the connection.
You got /4 concepts.