Challenge - 5 Problems
SSL Mastery Badge
Get all challenges correct to earn this badge!
Test your skills under time pressure!
💻 Command Output
intermediate1:30remaining
Check enabled SSL protocols in Nginx
You run the command
nginx -T | grep ssl_protocols on your server. What output do you expect if only TLSv1.2 and TLSv1.3 are enabled?Nginx
nginx -T | grep ssl_protocols
Attempts:
2 left
💡 Hint
Only modern TLS versions TLSv1.2 and TLSv1.3 should be enabled for security.
✗ Incorrect
The
ssl_protocols directive lists enabled SSL/TLS versions. TLSv1.2 and TLSv1.3 are secure and recommended. Older versions like TLSv1, TLSv1.1, and SSLv3 are insecure and should be disabled.❓ Configuration
intermediate1:30remaining
Configure strong cipher suites in Nginx
Which
ssl_ciphers configuration line enables only strong ciphers recommended for modern browsers?Attempts:
2 left
💡 Hint
Strong ciphers exclude anonymous and weak algorithms.
✗ Incorrect
The
HIGH:!aNULL:!MD5 cipher string enables only high-security ciphers, excluding anonymous (aNULL) and MD5-based ciphers which are weak or insecure.❓ Troubleshoot
advanced2:00remaining
Troubleshoot SSL handshake failure due to protocol mismatch
A client reports SSL handshake failure connecting to your Nginx server. Your config has
ssl_protocols TLSv1.3; only. The client supports TLSv1.2 but not TLSv1.3. What is the cause?Attempts:
2 left
💡 Hint
Handshake requires at least one common protocol version.
✗ Incorrect
If the server only supports TLSv1.3 but the client supports only TLSv1.2, they cannot agree on a protocol version, causing handshake failure.
✅ Best Practice
advanced2:00remaining
Select the best SSL configuration for security and compatibility
Which Nginx SSL configuration balances strong security and broad client compatibility?
Attempts:
2 left
💡 Hint
Avoid old protocols and weak ciphers but keep TLSv1.2 for compatibility.
✗ Incorrect
Option A enables only secure protocols TLSv1.2 and TLSv1.3, uses strong ciphers, and prefers server cipher order for security. Other options enable insecure protocols or weak ciphers.
🧠 Conceptual
expert2:30remaining
Impact of disabling TLSv1.2 in Nginx SSL config
What is the most likely impact if you remove TLSv1.2 from
ssl_protocols and keep only TLSv1.3 in Nginx?Attempts:
2 left
💡 Hint
Consider client support for TLS versions.
✗ Incorrect
Removing TLSv1.2 means clients that only support up to TLSv1.2 cannot connect, causing connection failures and reduced compatibility.