SSH basics Flashcards

1
Q

SSH is a technology for connecting to a remote server and accessing a command line on that server, often in order to ad____ it.

A

SSH is a technology for connecting to a remote server and accessing a command line on that server, often in order to administer it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SSH is usually used to access servers running U___-like operating systems, but your own computer doesn’t have to be running U___ in order to use SSH

A

SSH is usually used to access servers running Unix-like operating systems, but your own computer doesn’t have to be running Unix in order to use SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SSH is a secure protocol used as the primary means of connecting to Linux servers remotely. It provides a text-based interface by spawning a remote shell. After connecting, all commands you type in your local terminal are sent to the r____ s_____ and executed there.

A

SSH is a secure protocol used as the primary means of connecting to Linux servers remotely. It provides a text-based interface by spawning a remote shell. After connecting, all commands you type in your local terminal are sent to the remote server and executed there.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When you connect through SSH, you log in using an account that exists on the r____ s_____.

A

When you connect through SSH, you log in using an account that exists on the remote server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When you connect through SSH, you will be dropped into a s___ session, which is a text-based interface where you can interact with your server.

A

When you connect through SSH, you will be dropped into a shell session, which is a text-based interface where you can interact with your server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For the duration of your SSH session, any commands that you type into your local terminal are sent through an encrypted SSH t____ and executed on your server.

A

For the duration of your SSH session, any commands that you type into your local terminal are sent through an encrypted SSH tunnel and executed on your server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

For an SSH connection to be established, the remote machine must be running a piece of software called an SSH d_____

A

For an SSH connection to be established, the remote machine must be running a piece of software called an SSH daemon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSH keys are a matching set of c________ic keys which can be used for authentication

A

SSH keys are a matching set of cryptographic keys which can be used for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSH keys are 2048 b__s by default. This is generally considered to be good enough for security, but you can specify a greater number of b__s for a more hardened key.

A

SSH keys are 2048 bits by default. This is generally considered to be good enough for security, but you can specify a greater number of bits for a more hardened key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To find out the fingerprint of an SSH key, type:

A

ssh-keygen -l

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To connect to a remote server and open a shell session there, you can use the s__ command.

A

To connect to a remote server and open a shell session there, you can use the ssh command.

ssh remote_host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

By default the SSH daemon on a server runs on port __

A

By default the SSH daemon on a server runs on port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

you will have to specify the new port number when connecting with your client, which you can do with the -_ option

A

-p option to specify port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

you can create or edit a configuration file in the ~/.ssh directory within the home directory of your local computer.

Edit or create the file now by typing:

A

nano ~/.ssh/config
OR
vim ~/.ssh/config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

to completely disable root login through SSH after you have set up an SSH user account that has sudo privileges, open the SSH daemon configuration file with root or sudo on your remote server do the following 3 things:

A

1)
sudo nano /etc/ssh/sshd_config
OR
sudo vim /etc/ssh/sshd_config

2)
PermitRootLogin no

To implement your changes, restart the SSH daemon
3)
sudo service ssh restart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ is the default location for SSH keys on Unix-based systems (like macOS and Linux). The ~ represents your h___ directory.

A

~/.ssh is the default location for SSH keys on Unix-based systems (like macOS and Linux). The ~ represents your home directory.

17
Q

SSH is used for remote file t_____, network m______, and remote o_____ s_____ access

A

SSH is used for remote file transfer, network management, and remote operating system access

18
Q

The private vs public nomenclature can be confusing as they are both called keys. It is more helpful to think of the public key as a “l___” and the private key as the “key”. You give the public ‘l___’ to remote parties to encrypt or ‘l___’ data. This data is then opened with the ‘private’ key which you hold in a secure place.

A

The private vs public nomenclature can be confusing as they are both called keys. It is more helpful to think of the public key as a “lock” and the private key as the “key”. You give the public ‘lock’ to remote parties to encrypt or ‘lock’ data. This data is then opened with the ‘private’ key which you hold in a secure place.

19
Q

SSH keys are used to a_____ s_____ connections

A

SSH keys are used to authenticate secure connections