Home »
Aptitude Questions and Answers »
Networking Aptitude Questions
Networking | Remote Login & Protocols Aptitude Questions and Answers
Networking | Remote Login & Protocols Aptitude Questions and Answers: This section contains aptitude questions and answers on Networking | Remote Login & Protocols.
Submitted by Nidhi, on June 10, 2021
Networking Remote Login & Protocols Aptitude Questions and Answers
1) There are the following statements that are given below, which of them are correct about remote login?
- Remote login is a mechanism that is used to access the computer which is located in a different location using remote login protocols.
- Using remote login we can access the computer through the command line only.
- Now a day's remote login is very popular for remote support in almost all companies.
- All the above
Options:
- A and B
- A and C
- B and C
- D
Correct answer: 2
A and C
Explanation:
Statements A and C are correct about remote login.
2) Which of the following protocols are used for remote login?
- telnet
- ssh
- ftp
- scp
Options:
- A and B
- A and C
- B and C
- D
Correct answer: 1
A and B
Explanation:
Statements A and B are the correct protocols used for remote login.
3) Which of the following applications are used for remote login?
- AnyDesk
- TeamViewer
- VNC connect
- GoToMyPC
Options:
- A and B
- A and C
- B, C, and D
- A, B, C, and D
Correct answer: 4
A, B, C, and D
Explanation:
All given applications are used for remote login.
4) Which of the following applications are used for remote login in the Linux operating system?
- RealVNC
- Remmina
- NoMachine
- TeamViewer
Options:
- A and B
- A and C
- A, B, and C
- A, B, C, and D
Correct answer: 4
A, B, C, and D
Explanation:
All given applications are used for remote login in the Linux operating system.
5) The TeamViewer application uses its own protocol for remote login?
- Yes
- No
Correct answer: 1
Yes
Explanation:
Yes, the TeamViewer application uses its own protocol for remote login.
6) The telnet protocol operates on which layer of the OSI model?
- Network layer
- Transport layer
- Presentation layer
- Application layer
Correct answer: 4
Application layer
Explanation:
The telnet protocol operates on the application layer of the OSI model.
7) In which year the telnet protocol was developed?
- 1965
- 1969
- 1972
- 1988
Correct answer: 2
1969
Explanation:
The telnet was developed in 1969.
8) Which of the following RFC numbers are related to telnet?
- RFC 860
- RFC 861
- RFC 885
- RFC 1073
Options:
- A and B
- A and C
- B, C, and D
- A, B, C, and D
Correct answer: 4
A, B, C, and D
Explanation:
All given RFC numbers are related to telnet.
9) What is the full form of NVT?
- Network Viewer Terminal
- Network Virtual Terminal
- Next Virtual Terminal
- Network Viewer Telecast
Correct answer: 2
Network Virtual Terminal
Explanation:
The NVT stands for Network Virtual Terminal.
10) There are the following statements that are given below, which of them are correct about NVT?
- The NVT is used for remote login; it defines how data and commands should be sent in the network.
- It acts as an interface and used to resolve dependencies for remote login between client and server system.
- The NVT stands for Network Viewer Terminal.
- All the above
Options:
- A and B
- A and C
- B and C
- D
Correct answer: 1
A and B
Explanation:
Statements A and B are correct about NVT.
11) Which of the following operating system supports telnet protocol?
- Windows
- Linux
- Mac
- All of the above
Options:
- A and B
- A and C
- B and C
- D
Correct answer: 4
D
Explanation:
All given operating system supports telnet protocol.
12) Which of the following command is used for telnet in the Linux operating system?
- tl
- telnet
- tn
- tnet
Correct answer: 2
telnet
Explanation:
The "telnet" command is used in the Linux operating system.
13) The telnet protocol can work with IPv6 addresses?
- Yes
- No
Correct answer: 1
Yes
Explanation:
Yes, the telnet protocol can work with IPv6 addresses.
14) There are the following statements that are given below, which of them are correct about SSH protocol?
- It is a remote login protocol, which is used to remotely log in using the command line.
- SSH stands for Secure Shell.
- Port 22 is used for SSH by default.
- To use SSH protocol we required SSH server and SSH client programs.
Options:
- A and B
- A and C
- B and C
- D
Correct answer: 4
D
Explanation:
All given statements are correct about SSH.
15) In which year SSH was developed?
- 1990
- 1992
- 1995
- 1998
Correct answer: 3
1995
Explanation:
The SSH was developed in 1995.
16) The SSH uses cryptography for secured communication?
- Yes
- No
Correct answer: 1
Yes
Explanation:
Yes, The SSH uses cryptography for secured communication.
17) Which of the following is used as a default SSH client in Windows 10?
- sClient
- sshClient
- OpenSSH
- OpenSSHClient
Correct answer: 3
OpenSSH
Explanation:
The OpenSSH is used as a default SSH client in Windows 10.
18) Which of the following configuration file is used for SSH in the Linux operating system?
- /etc/config/ssh.conf
- /etc/ssh/sshd_config
- /etc/ssh.config
- /etc/sshfs.conf
Correct answer: 2
/etc/ssh/sshd_config
Explanation:
The "/etc/ssh/sshd_config" configuration file is used for SSH in the Linux operating system.
19) Which of the following command is used to generate SSH keys in the Linux operating system?
- keygen-ssh
- ssh-keygen
- ssh-key
- ssk-genkey
Correct answer: 2
ssh-keygen
Explanation:
The "ssh-keygen" command is used to generate SSH keys in the Linux operating system.
20) Which of the following remote login protocols are supported by the PuTTY application?
- SSH
- telnet
- Rlogin
- VNC
Options:
- A and B
- A, B, and C
- B, C, and D
- A, B, C, and D
Correct answer: 2
A, B, and C
Explanation:
Options A, B, and C are correct remote login protocols are supported by PuTTY application.