Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
SSH-2 does not contain _____________
C. physical layer
C. physical layer
See lessWhich standard TCP port is assigned for contacting SSH servers?
B. port 22
B. port 22
See lessSSH uses ___________ to authenticate the remote computer.
A. public-key cryptography
A. public-key cryptography
See lessSSH can be used in only _____________
C. both unix-like and windows systems
C. both unix-like and windows systems
See lessSecure shell (SSH) network protocol is used for
D. all of the mentioned
D. all of the mentioned
See lessThe domain name system is maintained by ______
A. distributed database system
A. distributed database system
See lessWildcard domain names start with label _______
B. *
B. *
See lessIf a server has no clue about where to find the address for a hostname then _______
A. server asks to the root server
A. server asks to the root server
See lessDNS database contains _______
D. all of the mentioned
D. all of the mentioned
See lessServers handle requests for other domains _______
B. by contacting remote dns server
B. by contacting remote dns server
See less