Remote login: SSH MCQs Quiz | Class 10
This quiz covers Class X Computer Applications (Code 165) Unit 1: Networking, focusing on Remote login: SSH. Test your understanding of secure remote login and its various uses. Complete the quiz and download a detailed answer PDF for revision.
Understanding Remote Login: SSH
SSH (Secure Shell) is a cryptographic network protocol that enables secure remote access to computers over an unsecured network. It ensures that data exchanged between a client and a server is encrypted, protecting it from eavesdropping, tampering, and other security threats.
Why SSH is Crucial
Before SSH, protocols like Telnet and FTP were common for remote login and file transfer. However, these protocols transmit information, including usernames and passwords, in plain text. This makes them highly vulnerable to security breaches. SSH resolves this by encrypting all communication, providing a secure alternative for managing servers and transferring files remotely.
Key Concepts and Features of SSH
- Secure Remote Access: SSH provides a secure channel for interacting with remote machines, allowing users to execute commands, manage files, and administer systems as if they were physically present.
- Data Encryption: All data transmitted over an SSH connection is encrypted. SSH uses a combination of symmetric encryption for the data stream and asymmetric encryption (public-key cryptography) for secure key exchange and authentication.
- Authentication Methods:
- Password Authentication: Users provide a password, which is encrypted before being sent to the server.
- Public-Key Authentication: A more robust and secure method. The user generates a pair of cryptographic keys: a private key (kept secret on the client) and a public key (stored on the remote server). When connecting, the server uses the public key to challenge the client, and the client uses its private key to prove its identity without ever transmitting the private key.
- SSH Client and Server:
- An SSH client (e.g., the
sshcommand in Linux/macOS, PuTTY in Windows) initiates the connection. - An SSH server (e.g.,
sshddaemon) runs on the remote machine, listening for incoming connections.
- An SSH client (e.g., the
- Default Port 22: By default, SSH operates over TCP port 22, though administrators can configure it to use a different port for added security.
- Secure File Transfer: SSH extends its security to file transfers through:
- SFTP (SSH File Transfer Protocol): A full-featured file transfer protocol built on SSH, offering advanced file management capabilities.
- SCP (Secure Copy Protocol): A command-line utility for securely copying files between hosts over an SSH connection.
SSH vs. Telnet: A Security Comparison
| Feature | SSH (Secure Shell) | Telnet (Telecommunication Network) |
|---|---|---|
| Security | Highly secure, uses strong encryption | Insecure, transmits data in plain text |
| Data Encryption | Yes, all traffic is encrypted | No, data is not encrypted |
| Authentication | Secure (password, public key) | Insecure (plain text password) |
| Default Port | TCP Port 22 | TCP Port 23 |
| Vulnerabilities | Resistant to eavesdropping and MITM attacks | Highly vulnerable to eavesdropping and MITM attacks |
| Use Case | Secure remote administration, file transfer | Legacy systems, internal secure networks (discouraged) |
Common Uses of SSH
- Remote Server Management: Administering servers, installing software, configuring settings from anywhere.
- Secure File Transfer: Safely moving files between local and remote systems using SFTP or SCP.
- Secure Tunnels (Port Forwarding): Creating encrypted tunnels to securely access other network services that might otherwise be insecure.
- Automated Tasks: Using SSH keys for script-based automation without requiring manual password entry, common in deployment and backup scripts.
- VPN Functionality: Can be used to proxy traffic, providing a basic form of VPN.
Quick Revision Points
- SSH stands for Secure Shell.
- Its main purpose is to provide secure remote access over unsecured networks.
- All SSH communications are encrypted to prevent eavesdropping and tampering.
- SSH uses both password and public-key authentication, with the latter being more secure.
- The default port for SSH is 22.
- SFTP and SCP are protocols that use SSH for secure file transfer.
- SSH is a secure replacement for insecure protocols like Telnet and FTP.
Practice Questions
-
Which of the following is an insecure alternative to SSH for remote login?
- a) RDP
- b) VNC
- c) Telnet
- d) FTP
Answer: c) Telnet
-
What cryptographic method does SSH primarily use to protect data confidentiality?
- a) Hashing
- b) Digital Signatures
- c) Encryption
- d) Obfuscation
Answer: c) Encryption
-
Where would you typically place your SSH public key for key-based authentication?
- a) On your local client machine
- b) On the remote server
- c) On a USB drive
- d) In your web browser
Answer: b) On the remote server
-
Which of these is a secure file transfer protocol built on SSH?
- a) HTTP
- b) FTP
- c) SFTP
- d) SMTP
Answer: c) SFTP
-
What advantage does public-key authentication offer over password authentication in SSH?
- a) It’s faster to type
- b) It uses a weaker encryption standard
- c) It eliminates the need to transmit the password
- d) It allows anonymous access
Answer: c) It eliminates the need to transmit the password

Content created and reviewed by the CBSE Quiz Editorial Team based on the latest NCERT textbooks and CBSE syllabus. Our goal is to help students practice concepts clearly, confidently, and exam-ready through well-structured MCQs and revision content.