Network Security Questions and Answers – Secure Shell(SSH) – II

This set of Network Security Puzzles focuses on “Secure Shell(SSH)”.

1. In the Key generation procedure, the Integrity Key from the client to server is represented as:
a) HASH(K||H||”E”||session_id)
b) HASH(K||H||”C”||session_id)
c) HASH(K||H||”B”||session_id)
d) HASH(K||H||”D”||session_id)
View Answer

Answer: a
Explanation: The Initialization Vector from the client to server is given by HASH(K||H||”E”||session_id).

2.In the Key generation procedure, the Integrity Key from the server to client is represented as:
a) HASH(K||H||”A”||session_id)
b) HASH(K||H||”B”||session_id)
c) HASH(K||H||”E”||session_id)
d) HASH(K||H||”F”||session_id)
View Answer

Answer: d
Explanation: The Initialization Vector from the server to client is given by HASH(K||H||”F”||session_id).

3.In the Key generation procedure, the Encryption key from the server to client is represented as:
a) HASH(K||H||”C”||session_id)
b) HASH(K||H||”B”||session_id)
c) HASH(K||H||”F”||session_id)
d) HASH(K||H||”D”||session_id)
View Answer

Answer: d
Explanation: The Initialization Vector from the server to client is given by HASH(K||H||”D”||session_id).
advertisement
advertisement

4. In the User Authentication Protocol, when the client requests for authentication, then the first byte ( in this format) has decimal value –
a) 80
b) 60
c) 50
d) 61
View Answer

Answer: c
Explanation: The first byte is assigned a value 50. This is the SSH user authentication message/byte.

5. SSH_MSG_USERAUTH_FALIURE is represented by byte-
a) 50
b) 51
c) 52
d) None of the mentioned
View Answer

Answer: b
Explanation: SSH_MSG_USERAUTH_FALIURE is represented by 51. This happens in cases when the server (1) either rejects the authentication request or (2) accepts the request but requires one or more additional authentication methods.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

6.SSH_MSG_USERAUTH_SUCCESS is represented by the byte –
a) 50
b) 51
c) 60
d) None of the mentioned
View Answer

Answer: d
Explanation: SSH_MSG_USERAUTH_SUCCESS is represented by 52.

7. Which of the following are valid authentication methods?
a) Public Key Based
b) Password Based
c) Host Based
d) All of the mentioned
View Answer

Answer: d
Explanation: The server may require one or more of the three authentication methods mentioned above.
advertisement

8.The SSH Connection Protocol runs on top of the SSH Transport Layer Protocol and assumes that a secure authentication connection is in use.
a) True
b) False
View Answer

Answer: a
Explanation: The statement is true.The SSH Connection Protocol does run on top of the SSH Transport Layer Protocol.

9. The secure authentication connection is referred to as-
a) chisel
b) tunnel
c) zeroing
d) handshaking
View Answer

Answer: b
Explanation: The secure connection is referred to as tunnel.
advertisement

10. The Secure Shell Connection Protocol Message exchange has the fist phase as “Opening a Channel” and it sends a message with parameters-
SSH_MSG_CHANNEL_OPEN
channel type
sender channel
innitial window size
maximum packet size
What is the data type sender channel/innitial window size/ channel type?
a) uint16
b) uint32
c) int16
d) int32
View Answer

Answer: b
Explanation: The data type is unsigned integer of size 32 bits.

11. In the “Opening a channel” phase what is the function of the “innitial window size” parameter?
a) It specifies the number of bytes in the IV
b) It specifies the maximum size of an individual packet
c) It specifies how many bytes of channel data can be sent
d) None of the mentioned
View Answer

Answer: c
Explanation: The ‘innitial window size’ specifies how many bytes of channel data can be sent.

12. In the “Opening a channel” phase what is the function of the “maximum packet size” parameter?
a) It specifies the number of bytes in the IV
b) It specifies the maximum size of an individual packet
c) It specifies how many bytes of channel data can be sent
d) None of the mentioned
View Answer

Answer: b
Explanation: The “maximum packet size” specifies the maximum size of an individual packet.

13. Which is not a channel recognized by the SSH connection protocol?
a) session
b) backward-tcpip
c) direct-tcpip
d) x11
View Answer

Answer: b
Explanation: Backward-tcpip is not a channel.

14. Which channel ensures local port forwarding?
a) session
b) x11
c) forward-tcpip
d) direct-tcpip
View Answer

Answer: d
Explanation: Direct-tcpip has the function of local port forwarding.

15.On which port will the server generally listen to for SMTP?
a) port 35
b) port 63
c) port 25
d) port 65
View Answer

Answer: c
Explanation: The server would have to listen on port 25 for the simple mail transfer protocol.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice puzzles on all areas of Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.