网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
SSH Server通常使用那一个服务通道(port)?()
- A、22
- B、512
- C、514
- D、729
参考答案
更多 “SSH Server通常使用那一个服务通道(port)?()A、22B、512C、514D、729” 相关考题
考题
下面对于SSH的说法错误的是?()A.SSH是Secure Shell的简称B.客户端使用ssh连接远程登录SSH服务器必须经过基于公钥的身份验证C.通常Linux操作系统会在/usr/local目录下默认安装OpenSSHD.SSH2比SSH1更安全
考题
WhichportsmustbeleftopenifanadministratorplanstoperformDynamicLPARoperations?()
A.port21(ftp):tcpandport657(rmc):tcpB.port22(ssh):tcpandport657(rmc):udpC.port657(rmc):tcpandport657(rmc):udpD.port161(snmp):tcpandport161(snmp):udp
考题
以下描述中不属于SSH用途的为?A、用于远程的安全管理,使用SSH客户端连接远程SSH服务器,建立安全的Shell交互环境B、用于本地到远程隧道的建立,进而提供安全通道,保证某些业务安全传输C、进行对本地数据使用SSH的秘钥进行加密报错,以提高其业务的可靠性D、SCP远程安全数据复制借助SSH协议进行传输,SSH提供其安全隧道保障
考题
Secure Shell (SSH) is a cryptographic network protocol for ( ) remote login and other secure network services over an(请作答此空)network.The standard( )port for SSH is 22. The best known example application is for remote login to computer systems by users.
SSH provides a secure channel over an insecured network in a( ) architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.
The most visible application of the protocol is for access to shell accounts on( )operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.A.secure
B.insecure
C.internet
D.internal
考题
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a (请作答此空) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were ( ) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.A.browser-server
B.user- server
C.client-server
D.business -customer
考题
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a ( ) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were (请作答此空) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.A.command-line
B.graphical
C.automation
D.productivity
考题
Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()A、 The FTP server sends back an acknowledgment (ACK) to the clientB、 The FTP server allocates a port touse for the data channel and transmit that port number to the clientC、 The FTP server opens the data channel to the client using the port number indicated by the clientD、 The FTP client opens the data channel to the FTP server on Port 20E、 The FTP client opens the datachannel to the FTP server on Port 21
考题
Which ports must be left open if an administrator plans to perform Dynamic LPAR operations?()A、 port 21(ftp):tcp and port 657(rmc):tcpB、 port 22(ssh):tcp and port 657(rmc):udpC、 port 657(rmc):tcp and port 657(rmc):udpD、 port 161(snmp):tcp and port 161(snmp):udp
考题
下面对于SSH的说法错误的是?()A、SSH是SecureShell的简称B、客户端使用ssh连接远程登录SSH服务器必须经过基于公钥的身份验证C、通常Linux操作系统会在/usr/local目录下默认安装OpenSSHD、SSH2比SSH1更安全
考题
When a Cisco router is configured for SSH, it acts as an ()?A、SSH clientB、SSH proxyC、SSH serverD、SSH and SSL server
考题
单选题Which ports must be left open if an administrator plans to perform Dynamic LPAR operations?()A
port 21(ftp):tcp and port 657(rmc):tcpB
port 22(ssh):tcp and port 657(rmc):udpC
port 657(rmc):tcp and port 657(rmc):udpD
port 161(snmp):tcp and port 161(snmp):udp
考题
多选题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server onlinE.What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? ()AConfigure port Fa0/1 to accept connections only from the static IP address of the server.BEmploy a proprietary connector type on Fa0/1 that is incompatible with other host connectors.CConfigure the MAC address of the server as a static entry associated with port Fa0/1.DBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.EConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.FConfigure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
考题
单选题Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()A
The FTP server sends back an acknowledgment (ACK) to the clientB
The FTP server allocates a port touse for the data channel and transmit that port number to the clientC
The FTP server opens the data channel to the client using the port number indicated by the clientD
The FTP client opens the data channel to the FTP server on Port 20E
The FTP client opens the datachannel to the FTP server on Port 21
考题
请挑出下列描述正确的选项: (1.0分) [单选.]
A. ssh服务 使用TCP协议并默认占用22端口 B. ssh服务 使用UDP协议并默认占用22端口 C. ssh服务 使用TCP协议并默认占用23端口 D. snmp服务与smtp服务使用相同端口
热门标签
最新试卷