Challenge - 5 Problems
SSH Security Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate2:00remaining
What makes SSH secure for remote management?
Which feature of SSH primarily ensures that your remote connection is encrypted and safe from eavesdropping?
Attempts:
2 left
💡 Hint
Think about how SSH protects data both during connection setup and data transfer.
✗ Incorrect
SSH uses asymmetric encryption to establish a secure connection and symmetric encryption for fast data transfer, ensuring confidentiality and integrity.
💻 Command Output
intermediate1:30remaining
SSH connection output understanding
What output do you expect when you run the command
ssh user@host for the first time connecting to a new server?Linux CLI
ssh user@host
Attempts:
2 left
💡 Hint
Think about how SSH prevents man-in-the-middle attacks on first connection.
✗ Incorrect
SSH asks to verify the server's fingerprint to ensure you are connecting to the correct server and not an impostor.
📝 Syntax
advanced2:00remaining
Identify the correct SSH command for key-based authentication
Which of the following commands correctly copies your public SSH key to a remote server for passwordless login?
Attempts:
2 left
💡 Hint
Look for the command designed to install your public key on the remote server.
✗ Incorrect
The ssh-copy-id command safely appends your public key to the remote server's authorized_keys file.
🔧 Debug
advanced2:30remaining
Why does this SSH connection fail?
You run
ssh user@host but get the error: Permission denied (publickey,password). What is the most likely cause?Attempts:
2 left
💡 Hint
Consider what authentication methods the server accepts and what you have configured.
✗ Incorrect
This error means the server requires public key authentication but your key is missing or not accepted, and password login is disabled.
🚀 Application
expert3:00remaining
How does SSH protect against man-in-the-middle attacks?
Which SSH feature specifically helps detect if someone is intercepting your connection and pretending to be the server?
Attempts:
2 left
💡 Hint
Think about how SSH verifies the server identity before establishing trust.
✗ Incorrect
SSH shows the server's fingerprint on first connection so you can verify it matches the real server, preventing impersonation.