Remote login: SSH MCQs Quiz | Class 10

This quiz covers Class X Computer Applications (Code 165) Unit 1: Networking, focusing on Remote login: SSH. Test your understanding of secure remote login and its various uses. Complete the quiz and download a detailed answer PDF for revision.

Understanding Remote Login: SSH

SSH (Secure Shell) is a cryptographic network protocol that enables secure remote access to computers over an unsecured network. It ensures that data exchanged between a client and a server is encrypted, protecting it from eavesdropping, tampering, and other security threats.

Why SSH is Crucial

Before SSH, protocols like Telnet and FTP were common for remote login and file transfer. However, these protocols transmit information, including usernames and passwords, in plain text. This makes them highly vulnerable to security breaches. SSH resolves this by encrypting all communication, providing a secure alternative for managing servers and transferring files remotely.

Key Concepts and Features of SSH

  1. Secure Remote Access: SSH provides a secure channel for interacting with remote machines, allowing users to execute commands, manage files, and administer systems as if they were physically present.
  2. Data Encryption: All data transmitted over an SSH connection is encrypted. SSH uses a combination of symmetric encryption for the data stream and asymmetric encryption (public-key cryptography) for secure key exchange and authentication.
  3. Authentication Methods:
    • Password Authentication: Users provide a password, which is encrypted before being sent to the server.
    • Public-Key Authentication: A more robust and secure method. The user generates a pair of cryptographic keys: a private key (kept secret on the client) and a public key (stored on the remote server). When connecting, the server uses the public key to challenge the client, and the client uses its private key to prove its identity without ever transmitting the private key.
  4. SSH Client and Server:
    • An SSH client (e.g., the ssh command in Linux/macOS, PuTTY in Windows) initiates the connection.
    • An SSH server (e.g., sshd daemon) runs on the remote machine, listening for incoming connections.
  5. Default Port 22: By default, SSH operates over TCP port 22, though administrators can configure it to use a different port for added security.
  6. Secure File Transfer: SSH extends its security to file transfers through:
    • SFTP (SSH File Transfer Protocol): A full-featured file transfer protocol built on SSH, offering advanced file management capabilities.
    • SCP (Secure Copy Protocol): A command-line utility for securely copying files between hosts over an SSH connection.

SSH vs. Telnet: A Security Comparison

Feature SSH (Secure Shell) Telnet (Telecommunication Network)
Security Highly secure, uses strong encryption Insecure, transmits data in plain text
Data Encryption Yes, all traffic is encrypted No, data is not encrypted
Authentication Secure (password, public key) Insecure (plain text password)
Default Port TCP Port 22 TCP Port 23
Vulnerabilities Resistant to eavesdropping and MITM attacks Highly vulnerable to eavesdropping and MITM attacks
Use Case Secure remote administration, file transfer Legacy systems, internal secure networks (discouraged)

Common Uses of SSH

  • Remote Server Management: Administering servers, installing software, configuring settings from anywhere.
  • Secure File Transfer: Safely moving files between local and remote systems using SFTP or SCP.
  • Secure Tunnels (Port Forwarding): Creating encrypted tunnels to securely access other network services that might otherwise be insecure.
  • Automated Tasks: Using SSH keys for script-based automation without requiring manual password entry, common in deployment and backup scripts.
  • VPN Functionality: Can be used to proxy traffic, providing a basic form of VPN.

Quick Revision Points

  • SSH stands for Secure Shell.
  • Its main purpose is to provide secure remote access over unsecured networks.
  • All SSH communications are encrypted to prevent eavesdropping and tampering.
  • SSH uses both password and public-key authentication, with the latter being more secure.
  • The default port for SSH is 22.
  • SFTP and SCP are protocols that use SSH for secure file transfer.
  • SSH is a secure replacement for insecure protocols like Telnet and FTP.

Practice Questions

  1. Which of the following is an insecure alternative to SSH for remote login?

    • a) RDP
    • b) VNC
    • c) Telnet
    • d) FTP

    Answer: c) Telnet

  2. What cryptographic method does SSH primarily use to protect data confidentiality?

    • a) Hashing
    • b) Digital Signatures
    • c) Encryption
    • d) Obfuscation

    Answer: c) Encryption

  3. Where would you typically place your SSH public key for key-based authentication?

    • a) On your local client machine
    • b) On the remote server
    • c) On a USB drive
    • d) In your web browser

    Answer: b) On the remote server

  4. Which of these is a secure file transfer protocol built on SSH?

    • a) HTTP
    • b) FTP
    • c) SFTP
    • d) SMTP

    Answer: c) SFTP

  5. What advantage does public-key authentication offer over password authentication in SSH?

    • a) It’s faster to type
    • b) It uses a weaker encryption standard
    • c) It eliminates the need to transmit the password
    • d) It allows anonymous access

    Answer: c) It eliminates the need to transmit the password