Remote exeution of applications Flashcards

1
Q

rlogin command

A
  • OpenSSH remote login client
  • insecure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

rsh command

A
  • OpenSSH remote login client
  • insecure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

telnet command

A

Name:

TErminal NETwork

  • user interface to the TELNET protocol
  • entire connection is unencrypted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ssh command

A

Name:

Secure SHell

Types of keys:

  • User key(within users)
  • Host key(within remote system)
  • Session key(needed when large amount of data is to be transmitted)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ssh procedures

A
  1. Public keys from the locat computers are passed to the server
  2. Servers then identifies if the public key is registered
  3. If so, the server then creates a new secret key and encrypts it with the public key
  4. This encrypted code is sent to the local computer
  5. This data is unlocked by the private key of the local system and is sent to the server
  6. Server after receiving this data verifies the local computer
  7. SSH creates a route and all the encrypted data are transferred through it without security issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly