1. Which protocol is primarily used for encrypting web traffic?

πŸ”˜ A) SSH
πŸ”˜ B) SSL/TLS
πŸ”˜ C) PGP
πŸ”˜ D) HTTP

βœ… Answer: B) SSL/TLS
πŸ’‘ Explanation: SSL/TLS (Secure Sockets Layer/Transport Layer Security) is used to secure web traffic by encrypting data between the client and server.


2. What port does SSH typically run on by default?

πŸ”˜ A) 22
πŸ”˜ B) 443
πŸ”˜ C) 25
πŸ”˜ D) 80

βœ… Answer: A) 22
πŸ’‘ Explanation: SSH (Secure Shell) operates on port 22 by default, providing secure remote login and command execution.


3. Which encryption technique is used in SSL/TLS for key exchange?

πŸ”˜ A) AES
πŸ”˜ B) RSA
πŸ”˜ C) MD5
πŸ”˜ D) SHA-256

βœ… Answer: B) RSA
πŸ’‘ Explanation: RSA (Rivest-Shamir-Adleman) is commonly used in SSL/TLS to securely exchange encryption keys between parties.


4. What does PGP stand for?

πŸ”˜ A) Pretty Good Privacy
πŸ”˜ B) Perfect Global Protection
πŸ”˜ C) Private Gateway Protocol
πŸ”˜ D) Public Group Policy

βœ… Answer: A) Pretty Good Privacy
πŸ’‘ Explanation: PGP (Pretty Good Privacy) is used for securing emails and files through encryption and digital signatures.


5. What is the primary use of PGP?

πŸ”˜ A) Encrypting web traffic
πŸ”˜ B) Securing remote logins
πŸ”˜ C) Encrypting and signing emails
πŸ”˜ D) Protecting Wi-Fi networks

βœ… Answer: C) Encrypting and signing emails
πŸ’‘ Explanation: PGP is widely used for encrypting emails and digitally signing messages to ensure confidentiality and authenticity.


6. Which cryptographic method does SSH use for authentication?

πŸ”˜ A) Symmetric encryption
πŸ”˜ B) Public-key cryptography
πŸ”˜ C) Hashing
πŸ”˜ D) Quantum cryptography

βœ… Answer: B) Public-key cryptography
πŸ’‘ Explanation: SSH uses public-key cryptography for authentication, allowing secure access using key pairs.


7. Which version of TLS is considered insecure and deprecated?

πŸ”˜ A) TLS 1.2
πŸ”˜ B) TLS 1.3
πŸ”˜ C) TLS 1.0
πŸ”˜ D) TLS 2.0

βœ… Answer: C) TLS 1.0
πŸ’‘ Explanation: TLS 1.0 has several known vulnerabilities and has been deprecated in favor of TLS 1.2 and TLS 1.3.


8. What command is used to initiate an SSH connection in Linux?

πŸ”˜ A) connect-ssh
πŸ”˜ B) ssh user@hostname
πŸ”˜ C) start ssh
πŸ”˜ D) ssh-keygen

βœ… Answer: B) ssh user@hostname
πŸ’‘ Explanation: The ssh command is used to connect to a remote server securely.


9. Which layer of the OSI model does SSL/TLS operate at?

πŸ”˜ A) Network layer
πŸ”˜ B) Transport layer
πŸ”˜ C) Application layer
πŸ”˜ D) Data link layer

βœ… Answer: B) Transport layer
πŸ’‘ Explanation: SSL/TLS operates at the transport layer to provide encryption for higher-layer protocols like HTTP.


10. What is the primary purpose of TLS Handshake?

πŸ”˜ A) Encrypting all data during transmission
πŸ”˜ B) Authenticating the server and client and negotiating encryption parameters
πŸ”˜ C) Checking for network latency
πŸ”˜ D) Detecting malware

βœ… Answer: B) Authenticating the server and client and negotiating encryption parameters
πŸ’‘ Explanation: The TLS handshake is a process where cryptographic keys and encryption methods are agreed upon before secure communication begins.


11. What does an SSH private key provide?

πŸ”˜ A) Public authentication
πŸ”˜ B) Secure decryption and authentication
πŸ”˜ C) Hashing only
πŸ”˜ D) Symmetric key exchange

βœ… Answer: B) Secure decryption and authentication
πŸ’‘ Explanation: The SSH private key is used to decrypt data and authenticate securely.


12. Which protocol replaced SSL due to its security flaws?

πŸ”˜ A) SSH
πŸ”˜ B) PGP
πŸ”˜ C) TLS
πŸ”˜ D) HTTPS

βœ… Answer: C) TLS
πŸ’‘ Explanation: TLS (Transport Layer Security) replaced SSL due to vulnerabilities like POODLE and BEAST attacks.


13. What is Forward Secrecy in TLS?

πŸ”˜ A) A method for passwordless authentication
πŸ”˜ B) A feature that ensures past communications remain secure even if keys are compromised
πŸ”˜ C) A cryptographic hashing method
πŸ”˜ D) A method for faster SSL handshakes

βœ… Answer: B) A feature that ensures past communications remain secure even if keys are compromised
πŸ’‘ Explanation: Forward Secrecy prevents previously captured encrypted data from being decrypted if private keys are later exposed.


14. What type of encryption does SSH use?

πŸ”˜ A) Only symmetric encryption
πŸ”˜ B) Only asymmetric encryption
πŸ”˜ C) A combination of symmetric and asymmetric encryption
πŸ”˜ D) No encryption

βœ… Answer: C) A combination of symmetric and asymmetric encryption
πŸ’‘ Explanation: SSH uses asymmetric encryption for authentication and symmetric encryption for session encryption.


15. What does a TLS certificate contain?

πŸ”˜ A) A public key and a private key
πŸ”˜ B) A public key, domain name, and certificate authority signature
πŸ”˜ C) Only the private key
πŸ”˜ D) A list of all visited websites

βœ… Answer: B) A public key, domain name, and certificate authority signature
πŸ’‘ Explanation: A TLS certificate contains a public key, the domain name, and a CA signature for authenticity.


16. What is the primary risk of using self-signed TLS certificates?

πŸ”˜ A) They are expensive
πŸ”˜ B) They may not be trusted by browsers
πŸ”˜ C) They cannot be revoked
πŸ”˜ D) They use weak encryption

βœ… Answer: B) They may not be trusted by browsers
πŸ’‘ Explanation: Self-signed certificates are not verified by trusted Certificate Authorities (CAs) and may trigger security warnings.


17. What is the primary function of the SSH agent?

πŸ”˜ A) Generate SSH keys
πŸ”˜ B) Store decrypted private keys securely in memory
πŸ”˜ C) Encrypt SSH traffic
πŸ”˜ D) Manage SSL certificates

βœ… Answer: B) Store decrypted private keys securely in memory
πŸ’‘ Explanation: The SSH agent stores decrypted private keys so users don’t have to re-enter passphrases frequently.


18. What is the default port for HTTPS (SSL/TLS-secured web traffic)?

πŸ”˜ A) 80
πŸ”˜ B) 22
πŸ”˜ C) 443
πŸ”˜ D) 53

βœ… Answer: C) 443
πŸ’‘ Explanation: HTTPS (secured via SSL/TLS) runs on port 443.


19. Which algorithm is commonly used in PGP for symmetric encryption?

πŸ”˜ A) AES
πŸ”˜ B) RSA
πŸ”˜ C) SHA-256
πŸ”˜ D) MD5

βœ… Answer: A) AES
πŸ’‘ Explanation: PGP uses AES (Advanced Encryption Standard) for symmetric encryption.


20. What does the “S” in HTTPS stand for?

πŸ”˜ A) Secure
πŸ”˜ B) Server
πŸ”˜ C) SSH
πŸ”˜ D) Session

βœ… Answer: A) Secure
πŸ’‘ Explanation: HTTPS stands for HyperText Transfer Protocol Secure, indicating that SSL/TLS secures the connection.


21. What is the primary purpose of SSH tunneling?

πŸ”˜ A) Encrypting website traffic
πŸ”˜ B) Securely forwarding network traffic through an encrypted channel
πŸ”˜ C) Generating PGP keys
πŸ”˜ D) Signing TLS certificates

βœ… Answer: B) Securely forwarding network traffic through an encrypted channel
πŸ’‘ Explanation: SSH tunneling (port forwarding) securely routes network traffic through an encrypted SSH connection.


22. Which hashing algorithm is commonly used for message integrity in TLS?

πŸ”˜ A) SHA-256
πŸ”˜ B) MD5
πŸ”˜ C) Blowfish
πŸ”˜ D) RC4

βœ… Answer: A) SHA-256
πŸ’‘ Explanation: SHA-256 is widely used for ensuring message integrity in TLS communication.


23. What does HSTS (HTTP Strict Transport Security) do?

πŸ”˜ A) Enforces HTTPS connections
πŸ”˜ B) Encrypts email messages
πŸ”˜ C) Secures SSH logins
πŸ”˜ D) Strengthens PGP encryption

βœ… Answer: A) Enforces HTTPS connections
πŸ’‘ Explanation: HSTS ensures that browsers always use HTTPS for a website, preventing downgrade attacks.


24. What does the openssl s_client command do?

πŸ”˜ A) Establishes an encrypted SSH session
πŸ”˜ B) Tests SSL/TLS connections to a server
πŸ”˜ C) Generates SSH key pairs
πŸ”˜ D) Encrypts files with PGP

βœ… Answer: B) Tests SSL/TLS connections to a server
πŸ’‘ Explanation: The openssl s_client command checks TLS/SSL certificates and configurations of remote servers.


25. What key size is considered secure for SSH key pairs?

πŸ”˜ A) 512-bit
πŸ”˜ B) 1024-bit
πŸ”˜ C) 2048-bit or higher
πŸ”˜ D) 128-bit

βœ… Answer: C) 2048-bit or higher
πŸ’‘ Explanation: 2048-bit or higher (e.g., 4096-bit) RSA keys are recommended for strong SSH security.


26. What is a wildcard SSL certificate?

πŸ”˜ A) A certificate that can be used for multiple domains
πŸ”˜ B) A certificate used for a single subdomain
πŸ”˜ C) A self-signed certificate
πŸ”˜ D) A certificate with unlimited validity

βœ… Answer: A) A certificate that can be used for multiple domains
πŸ’‘ Explanation: Wildcard SSL certificates secure a domain and all its subdomains (e.g., *.example.com).


27. Which attack exploits the SSL/TLS renegotiation process?

πŸ”˜ A) POODLE
πŸ”˜ B) Heartbleed
πŸ”˜ C) BEAST
πŸ”˜ D) Triple Handshake Attack

βœ… Answer: D) Triple Handshake Attack
πŸ’‘ Explanation: The Triple Handshake Attack exploits session renegotiation in TLS, allowing MITM attacks.


28. What is the primary goal of the SSH protocol?

πŸ”˜ A) Secure email transmission
πŸ”˜ B) Encrypt web traffic
πŸ”˜ C) Secure remote administration and file transfers
πŸ”˜ D) Secure database queries

βœ… Answer: C) Secure remote administration and file transfers
πŸ’‘ Explanation: SSH is used to remotely manage systems and transfer files securely.


29. What does OCSP (Online Certificate Status Protocol) check?

πŸ”˜ A) If an SSL certificate is revoked
πŸ”˜ B) If SSH keys are compromised
πŸ”˜ C) If a website supports HTTPS
πŸ”˜ D) If a TLS handshake is completed

βœ… Answer: A) If an SSL certificate is revoked
πŸ’‘ Explanation: OCSP checks whether an SSL/TLS certificate has been revoked by the issuing CA.


30. Which cryptographic method does SSH use for secure key exchange?

πŸ”˜ A) Diffie-Hellman
πŸ”˜ B) RSA
πŸ”˜ C) MD5
πŸ”˜ D) ECC

βœ… Answer: A) Diffie-Hellman
πŸ’‘ Explanation: SSH uses Diffie-Hellman key exchange to securely establish a session key.


31. What does a Certificate Authority (CA) do?

πŸ”˜ A) Issues digital certificates
πŸ”˜ B) Manages SSH logins
πŸ”˜ C) Encrypts TLS traffic
πŸ”˜ D) Stores SSL keys

βœ… Answer: A) Issues digital certificates
πŸ’‘ Explanation: CAs issue SSL/TLS certificates that verify a website’s authenticity.


32. Which protocol secures email communication using PGP?

πŸ”˜ A) SMTP
πŸ”˜ B) OpenPGP
πŸ”˜ C) IMAP
πŸ”˜ D) POP3

βœ… Answer: B) OpenPGP
πŸ’‘ Explanation: OpenPGP is an encryption standard used for securing emails.


33. What does the “Perfect” in Perfect Forward Secrecy (PFS) mean?

πŸ”˜ A) Data is encrypted with a perfect algorithm
πŸ”˜ B) No past session keys can be compromised
πŸ”˜ C) It guarantees 100% security
πŸ”˜ D) Only quantum-resistant encryption is used

βœ… Answer: B) No past session keys can be compromised
πŸ’‘ Explanation: PFS ensures that past encrypted data cannot be decrypted even if private keys are compromised.


34. Which attack exploits SSL/TLS padding vulnerabilities?

πŸ”˜ A) POODLE
πŸ”˜ B) CRIME
πŸ”˜ C) BEAST
πŸ”˜ D) FREAK

βœ… Answer: A) POODLE
πŸ’‘ Explanation: POODLE (Padding Oracle On Downgraded Legacy Encryption) exploits SSL 3.0 padding vulnerabilities.


35. What is the purpose of SSH-Agent?

πŸ”˜ A) Store private keys securely in memory
πŸ”˜ B) Generate SSH keys
πŸ”˜ C) Manage SSL certificates
πŸ”˜ D) Encrypt web traffic

βœ… Answer: A) Store private keys securely in memory
πŸ’‘ Explanation: SSH-Agent caches decrypted SSH private keys, so users don’t need to re-enter passphrases.


36. What is the primary function of TLS session resumption?

πŸ”˜ A) Reduce handshake time
πŸ”˜ B) Generate new certificates
πŸ”˜ C) Encrypt email communication
πŸ”˜ D) Detect revoked certificates

βœ… Answer: A) Reduce handshake time
πŸ’‘ Explanation: TLS session resumption allows a client to reconnect faster by skipping a full handshake.


37. What attack does HSTS help mitigate?

πŸ”˜ A) SSL stripping
πŸ”˜ B) Heartbleed
πŸ”˜ C) Man-in-the-middle (MITM)
πŸ”˜ D) BEAST

βœ… Answer: A) SSL stripping
πŸ’‘ Explanation: HSTS ensures browsers only use HTTPS, preventing SSL stripping attacks.


38. Which protocol ensures encrypted file transfer over SSH?

πŸ”˜ A) FTP
πŸ”˜ B) SCP
πŸ”˜ C) HTTP
πŸ”˜ D) Telnet

βœ… Answer: B) SCP
πŸ’‘ Explanation: SCP (Secure Copy Protocol) uses SSH for encrypted file transfers.


39. What is the purpose of the “TLS Record Protocol”?

πŸ”˜ A) Encrypts data for secure transmission
πŸ”˜ B) Manages SSL certificates
πŸ”˜ C) Checks server uptime
πŸ”˜ D) Generates encryption keys

βœ… Answer: A) Encrypts data for secure transmission
πŸ’‘ Explanation: The TLS Record Protocol ensures data confidentiality and integrity.


40. What is an SSH bastion host used for?

πŸ”˜ A) Securely managing remote access
πŸ”˜ B) Encrypting email communication
πŸ”˜ C) Generating PGP keys
πŸ”˜ D) Managing TLS handshakes

βœ… Answer: A) Securely managing remote access
πŸ’‘ Explanation: A bastion host is an exposed SSH server that acts as a secure gateway.


41. What is the primary function of an SSH fingerprint?

πŸ”˜ A) To encrypt SSH traffic
πŸ”˜ B) To verify the authenticity of an SSH server
πŸ”˜ C) To generate new SSH keys
πŸ”˜ D) To prevent brute-force attacks

βœ… Answer: B) To verify the authenticity of an SSH server
πŸ’‘ Explanation: An SSH fingerprint is a cryptographic hash of the server’s public key, used to verify its authenticity during connections.


42. What is a TLS Cipher Suite?

πŸ”˜ A) A collection of encryption algorithms used in TLS communication
πŸ”˜ B) A type of VPN protocol
πŸ”˜ C) A physical hardware security device
πŸ”˜ D) A hashing algorithm

βœ… Answer: A) A collection of encryption algorithms used in TLS communication
πŸ’‘ Explanation: A TLS Cipher Suite defines the encryption, hashing, and authentication algorithms used in a TLS session.


43. What type of attack does SSH key-based authentication help mitigate?

πŸ”˜ A) Brute-force password attacks
πŸ”˜ B) Cross-Site Scripting (XSS)
πŸ”˜ C) SQL Injection
πŸ”˜ D) Man-in-the-Middle (MITM)

βœ… Answer: A) Brute-force password attacks
πŸ’‘ Explanation: SSH key-based authentication replaces passwords with cryptographic keys, preventing brute-force attacks.


44. What does the term “TLS fallback attack” refer to?

πŸ”˜ A) Forcing a connection to downgrade to a weaker TLS version
πŸ”˜ B) Cracking the TLS encryption key
πŸ”˜ C) Breaking a digital certificate
πŸ”˜ D) Forcing a session timeout

βœ… Answer: A) Forcing a connection to downgrade to a weaker TLS version
πŸ’‘ Explanation: A TLS fallback attack exploits protocol downgrades (e.g., forcing TLS 1.2 to use TLS 1.0), making it easier to exploit known vulnerabilities.


45. What does PGP use for key management?

πŸ”˜ A) Key pairs stored in a certificate authority
πŸ”˜ B) A web of trust model
πŸ”˜ C) A centralized key server
πŸ”˜ D) A blockchain-based trust system

βœ… Answer: B) A web of trust model
πŸ’‘ Explanation: PGP uses a web of trust, where users sign each other’s keys to establish credibility, unlike centralized CAs.


46. Which of the following is an open-source alternative to SSH?

πŸ”˜ A) Telnet
πŸ”˜ B) PuTTY
πŸ”˜ C) OpenSSH
πŸ”˜ D) SSL

βœ… Answer: C) OpenSSH
πŸ’‘ Explanation: OpenSSH is a free, open-source implementation of the SSH protocol used for secure remote administration.


47. What is the purpose of a self-signed TLS certificate?

πŸ”˜ A) To provide free, unlimited encryption
πŸ”˜ B) To secure internal applications without a Certificate Authority (CA)
πŸ”˜ C) To ensure global trust in a website
πŸ”˜ D) To enhance key rotation speed

βœ… Answer: B) To secure internal applications without a Certificate Authority (CA)
πŸ’‘ Explanation: Self-signed TLS certificates are typically used for internal servers and testing environments but are not trusted by default in browsers.


48. What is the default bit length for a modern SSH RSA key?

πŸ”˜ A) 512-bit
πŸ”˜ B) 1024-bit
πŸ”˜ C) 2048-bit
πŸ”˜ D) 4096-bit

βœ… Answer: C) 2048-bit
πŸ’‘ Explanation: The default RSA key length for SSH is 2048-bit, but 4096-bit is recommended for enhanced security.


49. What does Certificate Pinning help prevent?

πŸ”˜ A) Phishing attacks
πŸ”˜ B) Man-in-the-Middle (MITM) attacks with fraudulent certificates
πŸ”˜ C) Cross-Site Request Forgery (CSRF)
πŸ”˜ D) SQL Injection

βœ… Answer: B) Man-in-the-Middle (MITM) attacks with fraudulent certificates
πŸ’‘ Explanation: Certificate Pinning ensures only a specific certificate is trusted, preventing MITM attacks with rogue CAs.


50. What is the role of an SSH bastion host?

πŸ”˜ A) To act as a secure gateway for remote access
πŸ”˜ B) To generate TLS certificates
πŸ”˜ C) To encrypt TLS handshakes
πŸ”˜ D) To validate SSL certificates

βœ… Answer: A) To act as a secure gateway for remote access
πŸ’‘ Explanation: An SSH bastion host is a hardened server used as a jump host to access internal systems securely.


51. Which TLS version introduced 0-RTT (Zero Round-Trip Time) mode?

πŸ”˜ A) TLS 1.0
πŸ”˜ B) TLS 1.1
πŸ”˜ C) TLS 1.2
πŸ”˜ D) TLS 1.3

βœ… Answer: D) TLS 1.3
πŸ’‘ Explanation: TLS 1.3 introduced 0-RTT, allowing faster connections by reusing previously established sessions.


52. What is SSH X11 forwarding used for?

πŸ”˜ A) To transfer files securely
πŸ”˜ B) To run graphical applications over SSH
πŸ”˜ C) To increase SSH encryption strength
πŸ”˜ D) To verify SSH fingerprints

βœ… Answer: B) To run graphical applications over SSH
πŸ’‘ Explanation: SSH X11 forwarding allows users to run GUI applications remotely over SSH.


53. What does a wildcard TLS certificate secure?

πŸ”˜ A) A single domain
πŸ”˜ B) Multiple top-level domains
πŸ”˜ C) A domain and all of its subdomains
πŸ”˜ D) Only IP-based connections

βœ… Answer: C) A domain and all of its subdomains
πŸ’‘ Explanation: A wildcard certificate (e.g., *.example.com) secures all subdomains under a primary domain.


54. What command is used to generate a new SSH key pair?

πŸ”˜ A) ssh-keygen
πŸ”˜ B) ssh-add
πŸ”˜ C) ssh-copy-id
πŸ”˜ D) openssl keygen

βœ… Answer: A) ssh-keygen
πŸ’‘ Explanation: The ssh-keygen command generates a new SSH key pair for authentication.


55. What does TLS use to prevent replay attacks?

πŸ”˜ A) Nonces and sequence numbers
πŸ”˜ B) RSA encryption
πŸ”˜ C) Certificate Pinning
πŸ”˜ D) HSTS

βœ… Answer: A) Nonces and sequence numbers
πŸ’‘ Explanation: TLS uses nonces and sequence numbers to prevent replay attacks, ensuring messages aren’t duplicated.


56. What type of attack was exploited in the Heartbleed vulnerability?

πŸ”˜ A) Buffer overflow in OpenSSL’s Heartbeat extension
πŸ”˜ B) Man-in-the-Middle (MITM) attack
πŸ”˜ C) TLS handshake manipulation
πŸ”˜ D) SSH brute force

βœ… Answer: A) Buffer overflow in OpenSSL’s Heartbeat extension
πŸ’‘ Explanation: Heartbleed exploited a buffer overflow in OpenSSL, allowing attackers to read sensitive memory data.


57. What does SSH use for integrity checking?

πŸ”˜ A) HMAC
πŸ”˜ B) AES
πŸ”˜ C) RSA
πŸ”˜ D) Diffie-Hellman

βœ… Answer: A) HMAC
πŸ’‘ Explanation: SSH uses HMAC (Hash-based Message Authentication Code) to verify data integrity.


58. What does TLS use for message confidentiality?

πŸ”˜ A) Symmetric encryption
πŸ”˜ B) Hashing
πŸ”˜ C) Public key encryption only
πŸ”˜ D) Salting

βœ… Answer: A) Symmetric encryption
πŸ’‘ Explanation: TLS uses symmetric encryption (e.g., AES) for message confidentiality.


61. What is the primary purpose of TLS mutual authentication?

πŸ”˜ A) To encrypt data using symmetric keys
πŸ”˜ B) To authenticate both the server and client using certificates
πŸ”˜ C) To enable certificate pinning
πŸ”˜ D) To establish an anonymous connection

βœ… Answer: B) To authenticate both the server and client using certificates
πŸ’‘ Explanation: TLS mutual authentication requires both the client and server to present valid certificates for identity verification.


62. What command is used to check the fingerprint of an SSH key?

πŸ”˜ A) ssh -V
πŸ”˜ B) ssh-keygen -lf keyfile
πŸ”˜ C) openssl check
πŸ”˜ D) tls-fingerprint

βœ… Answer: B) ssh-keygen -lf keyfile
πŸ’‘ Explanation: The ssh-keygen -lf command displays the fingerprint of an SSH public key.


63. What is the maximum bit length for an RSA key in OpenSSH?

πŸ”˜ A) 4096-bit
πŸ”˜ B) 8192-bit
πŸ”˜ C) 1024-bit
πŸ”˜ D) 16384-bit

βœ… Answer: D) 16384-bit
πŸ’‘ Explanation: OpenSSH supports RSA key lengths up to 16,384 bits, though 4096-bit is commonly used for security and performance.


64. What does the “G” in GPG stand for?

πŸ”˜ A) Government
πŸ”˜ B) GNU
πŸ”˜ C) General
πŸ”˜ D) Global

βœ… Answer: B) GNU
πŸ’‘ Explanation: GPG (GNU Privacy Guard) is an open-source implementation of PGP, used for secure communication.


65. What is the primary function of a TLS session ticket?

πŸ”˜ A) To encrypt email communications
πŸ”˜ B) To speed up subsequent TLS connections
πŸ”˜ C) To generate cryptographic keys
πŸ”˜ D) To validate OCSP responses

βœ… Answer: B) To speed up subsequent TLS connections
πŸ’‘ Explanation: TLS session tickets allow clients to resume previous TLS sessions without repeating a full handshake.


66. What is a common vulnerability in improperly configured SSH servers?

πŸ”˜ A) Key reuse
πŸ”˜ B) Lack of two-factor authentication
πŸ”˜ C) Weak ciphers and outdated algorithms
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ’‘ Explanation: SSH servers with weak ciphers, key reuse, and lack of 2FA are prone to brute-force and MITM attacks.


67. What is a CRL (Certificate Revocation List) used for?

πŸ”˜ A) Encrypting data
πŸ”˜ B) Listing revoked certificates
πŸ”˜ C) Signing SSH keys
πŸ”˜ D) Creating TLS handshakes

βœ… Answer: B) Listing revoked certificates
πŸ’‘ Explanation: A CRL (Certificate Revocation List) is used by Certificate Authorities to list revoked certificates.


68. What is the primary function of an SSH jump host?

πŸ”˜ A) Encrypt SSH connections
πŸ”˜ B) Act as an intermediary to access internal systems securely
πŸ”˜ C) Manage SSH keys
πŸ”˜ D) Generate SSH fingerprints

βœ… Answer: B) Act as an intermediary to access internal systems securely
πŸ’‘ Explanation: An SSH jump host is a secure gateway that routes SSH traffic to internal systems.


69. Which cryptographic algorithm was deprecated in TLS 1.3?

πŸ”˜ A) AES
πŸ”˜ B) RSA key exchange
πŸ”˜ C) ChaCha20
πŸ”˜ D) SHA-256

βœ… Answer: B) RSA key exchange
πŸ’‘ Explanation: TLS 1.3 removed RSA key exchange due to its lack of Forward Secrecy.


70. What is the function of the ssh-copy-id command?

πŸ”˜ A) Copy SSH keys to a remote server for passwordless login
πŸ”˜ B) Generate a new SSH key pair
πŸ”˜ C) Transfer encrypted files
πŸ”˜ D) Delete SSH keys

βœ… Answer: A) Copy SSH keys to a remote server for passwordless login
πŸ’‘ Explanation: The ssh-copy-id command securely transfers public SSH keys to a remote system for key-based authentication.


71. What is the primary advantage of using Ed25519 keys for SSH authentication?

πŸ”˜ A) Faster key generation and verification
πŸ”˜ B) Stronger encryption than RSA
πŸ”˜ C) Smaller key size with better security
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ’‘ Explanation: Ed25519 keys provide strong security, faster performance, and smaller key sizes, making them an excellent choice for SSH authentication.


72. What does TLS use to ensure confidentiality of session data?

πŸ”˜ A) Public-key cryptography
πŸ”˜ B) Symmetric encryption
πŸ”˜ C) Hashing algorithms
πŸ”˜ D) Diffie-Hellman key exchange

βœ… Answer: B) Symmetric encryption
πŸ’‘ Explanation: TLS uses symmetric encryption (e.g., AES) for data confidentiality after the handshake is completed.


73. What is the role of gpg --verify in PGP?

πŸ”˜ A) Encrypt a message
πŸ”˜ B) Verify a signed message or file
πŸ”˜ C) Generate a new key pair
πŸ”˜ D) Export public keys

βœ… Answer: B) Verify a signed message or file
πŸ’‘ Explanation: The gpg --verify command checks whether a PGP-signed file is valid and was not tampered with.


74. What is the default port for an SSH SOCKS proxy?

πŸ”˜ A) 22
πŸ”˜ B) 443
πŸ”˜ C) 1080
πŸ”˜ D) 8080

βœ… Answer: C) 1080
πŸ’‘ Explanation: The default port for an SSH SOCKS proxy is 1080, allowing secure browsing via SSH tunnels.


75. What is the purpose of an Extended Validation (EV) certificate in TLS?

πŸ”˜ A) To provide higher encryption strength
πŸ”˜ B) To verify the organization’s identity more strictly
πŸ”˜ C) To enable certificate pinning
πŸ”˜ D) To prevent brute-force attacks

βœ… Answer: B) To verify the organization’s identity more strictly
πŸ’‘ Explanation: EV certificates require stronger identity verification for organizations and show a green bar in older browsers.


76. What is the primary difference between SSH and Telnet?

πŸ”˜ A) SSH is encrypted, while Telnet is not
πŸ”˜ B) Telnet is faster than SSH
πŸ”˜ C) SSH is only used for Windows servers
πŸ”˜ D) Telnet supports only IPv6

βœ… Answer: A) SSH is encrypted, while Telnet is not
πŸ’‘ Explanation: SSH encrypts all communication, whereas Telnet sends data in plaintext, making it insecure.


77. What happens if an SSH private key is leaked?

πŸ”˜ A) The associated public key becomes invalid
πŸ”˜ B) Attackers can gain unauthorized access to systems
πŸ”˜ C) The SSH server shuts down automatically
πŸ”˜ D) The SSH fingerprint changes

βœ… Answer: B) Attackers can gain unauthorized access to systems
πŸ’‘ Explanation: If an SSH private key is compromised, attackers can authenticate as the legitimate user.


78. What type of key does SSH use to authenticate a client?

πŸ”˜ A) Public key
πŸ”˜ B) Private key
πŸ”˜ C) Symmetric key
πŸ”˜ D) Session key

βœ… Answer: A) Public key
πŸ’‘ Explanation: SSH authenticates clients using their public key, while the private key remains confidential.


79. What command lists all installed SSH keys in an agent?

πŸ”˜ A) ssh-keygen -l
πŸ”˜ B) ssh-agent -k
πŸ”˜ C) ssh-add -l
πŸ”˜ D) ssh-config --list

βœ… Answer: C) ssh-add -l
πŸ’‘ Explanation: The ssh-add -l command lists all keys stored in the SSH agent.


80. What cryptographic protocol is recommended for replacing RSA in SSH?

πŸ”˜ A) DSA
πŸ”˜ B) ChaCha20
πŸ”˜ C) Ed25519
πŸ”˜ D) DES

βœ… Answer: C) Ed25519
πŸ’‘ Explanation: Ed25519 is a modern, secure, and fast alternative to RSA in SSH authentication.


81. Which command is used to remove all identities from the SSH authentication agent?

πŸ”˜ A) ssh-agent -r
πŸ”˜ B) ssh-add -D
πŸ”˜ C) ssh-keygen -R
πŸ”˜ D) ssh-remove-all

βœ… Answer: B) ssh-add -D
πŸ’‘ Explanation: The ssh-add -D command removes all stored identities (SSH keys) from the SSH agent.


82. What is the primary purpose of the OCSP stapling mechanism in TLS?

πŸ”˜ A) To reduce OCSP response time and improve security
πŸ”˜ B) To generate TLS session keys
πŸ”˜ C) To enforce HTTPS in browsers
πŸ”˜ D) To provide Forward Secrecy

βœ… Answer: A) To reduce OCSP response time and improve security
πŸ’‘ Explanation: OCSP stapling allows a web server to attach an OCSP response to a TLS handshake, improving performance and security.


83. Which encryption algorithm is commonly used in modern TLS implementations?

πŸ”˜ A) RC4
πŸ”˜ B) AES-GCM
πŸ”˜ C) MD5
πŸ”˜ D) DES

βœ… Answer: B) AES-GCM
πŸ’‘ Explanation: AES-GCM (Advanced Encryption Standard with Galois Counter Mode) is a secure and efficient encryption algorithm used in modern TLS.


84. What does the Strict-Transport-Security HTTP header enforce?

πŸ”˜ A) Disabling non-secure HTTP connections
πŸ”˜ B) Enabling OCSP stapling
πŸ”˜ C) Enforcing HMAC authentication
πŸ”˜ D) Preventing SQL injection attacks

βœ… Answer: A) Disabling non-secure HTTP connections
πŸ’‘ Explanation: The Strict-Transport-Security (HSTS) header forces browsers to only use HTTPS, preventing downgrade attacks.


85. What is the primary function of TLS session resumption?

πŸ”˜ A) To speed up repeated TLS connections
πŸ”˜ B) To generate new SSL certificates
πŸ”˜ C) To encrypt SSH keys
πŸ”˜ D) To perform key rotation

βœ… Answer: A) To speed up repeated TLS connections
πŸ’‘ Explanation: TLS session resumption allows clients to reconnect faster without a full handshake.


86. What does SSH use to encrypt interactive terminal sessions?

πŸ”˜ A) Asymmetric encryption only
πŸ”˜ B) Symmetric encryption after key exchange
πŸ”˜ C) Hashing algorithms
πŸ”˜ D) Plaintext communication

βœ… Answer: B) Symmetric encryption after key exchange
πŸ’‘ Explanation: SSH uses asymmetric encryption for key exchange and then switches to symmetric encryption for session data.


87. What attack does SSH guard against by using sequence numbers?

πŸ”˜ A) Brute-force attacks
πŸ”˜ B) Replay attacks
πŸ”˜ C) SQL injection
πŸ”˜ D) Cross-site scripting (XSS)

βœ… Answer: B) Replay attacks
πŸ’‘ Explanation: SSH assigns sequence numbers to packets to prevent replay attacks.


88. What is the purpose of an intermediate certificate in SSL/TLS?

πŸ”˜ A) To sign root CA certificates
πŸ”˜ B) To establish a chain of trust between the root CA and end-entity certificates
πŸ”˜ C) To encrypt the TLS handshake
πŸ”˜ D) To store private keys

βœ… Answer: B) To establish a chain of trust between the root CA and end-entity certificates
πŸ’‘ Explanation: Intermediate certificates act as a bridge between root Certificate Authorities (CAs) and end-user certificates.


89. Which SSH configuration file controls server settings?

πŸ”˜ A) /etc/ssh/ssh_config
πŸ”˜ B) /etc/ssh/sshd_config
πŸ”˜ C) ~/.ssh/config
πŸ”˜ D) /var/log/ssh.log

βœ… Answer: B) /etc/ssh/sshd_config
πŸ’‘ Explanation: The /etc/ssh/sshd_config file contains SSH server settings, including port, authentication methods, and key exchange protocols.


90. What is the purpose of the tls-prober tool?

πŸ”˜ A) To check for TLS configuration issues and vulnerabilities
πŸ”˜ B) To scan networks for open SSH ports
πŸ”˜ C) To generate TLS keys
πŸ”˜ D) To perform brute-force attacks

βœ… Answer: A) To check for TLS configuration issues and vulnerabilities
πŸ’‘ Explanation: tls-prober scans servers for TLS misconfigurations and security flaws.


91. What SSH option prevents password authentication and enforces key-based login?

πŸ”˜ A) PermitRootLogin no
πŸ”˜ B) PasswordAuthentication no
πŸ”˜ C) AllowUsers root
πŸ”˜ D) EnablePasswordSecurity on

βœ… Answer: B) PasswordAuthentication no
πŸ’‘ Explanation: Setting PasswordAuthentication no in sshd_config forces SSH key-based authentication.


92. What is a common attack against weak SSH passwords?

πŸ”˜ A) SQL injection
πŸ”˜ B) Brute-force attack
πŸ”˜ C) Buffer overflow
πŸ”˜ D) Clickjacking

βœ… Answer: B) Brute-force attack
πŸ’‘ Explanation: Attackers use brute-force attacks to guess weak SSH passwords and gain unauthorized access.


93. What is the default expiration time for a PGP key?

πŸ”˜ A) 1 year
πŸ”˜ B) 5 years
πŸ”˜ C) No expiration by default
πŸ”˜ D) 10 years

βœ… Answer: C) No expiration by default
πŸ’‘ Explanation: PGP keys do not expire by default, but users can set expiration dates when generating a key.


94. What attack does TLS use MAC (Message Authentication Code) to prevent?

πŸ”˜ A) Man-in-the-Middle (MITM)
πŸ”˜ B) SQL injection
πŸ”˜ C) Timing attacks
πŸ”˜ D) Buffer overflow

βœ… Answer: A) Man-in-the-Middle (MITM)
πŸ’‘ Explanation: TLS MAC ensures message integrity, preventing MITM attacks.


95. What type of encryption does SSH use for file transfers?

πŸ”˜ A) RSA
πŸ”˜ B) Symmetric encryption
πŸ”˜ C) MD5
πŸ”˜ D) No encryption

βœ… Answer: B) Symmetric encryption
πŸ’‘ Explanation: SSH encrypts file transfers using symmetric encryption algorithms like AES.


96. What does the gpg --export command do?

πŸ”˜ A) Exports a PGP public key
πŸ”˜ B) Encrypts a message
πŸ”˜ C) Signs a file
πŸ”˜ D) Generates a new key pair

βœ… Answer: A) Exports a PGP public key
πŸ’‘ Explanation: gpg --export exports a PGP public key for sharing.


97. What is the role of sshd in SSH?

πŸ”˜ A) SSH client
πŸ”˜ B) SSH daemon (server)
πŸ”˜ C) Key generator
πŸ”˜ D) File encryption tool

βœ… Answer: B) SSH daemon (server)
πŸ’‘ Explanation: sshd is the SSH server process that listens for incoming connections.


98. What is the purpose of mod_ssl in Apache?

πŸ”˜ A) To enable TLS/SSL support in Apache web server
πŸ”˜ B) To generate SSH keys
πŸ”˜ C) To validate PGP signatures
πŸ”˜ D) To prevent brute-force attacks

βœ… Answer: A) To enable TLS/SSL support in Apache web server
πŸ’‘ Explanation: mod_ssl is an Apache module that enables SSL/TLS support.


99. What is the main purpose of Diffie-Hellman key exchange in SSH?

πŸ”˜ A) To securely establish a shared symmetric key
πŸ”˜ B) To generate public keys
πŸ”˜ C) To sign SSH certificates
πŸ”˜ D) To store passwords

βœ… Answer: A) To securely establish a shared symmetric key
πŸ’‘ Explanation: Diffie-Hellman allows SSH clients and servers to negotiate a shared secret securely.


100. What is the standard port for OCSP responder services?

πŸ”˜ A) 80
πŸ”˜ B) 443
πŸ”˜ C) 21
πŸ”˜ D) 8080

βœ… Answer: A) 80
πŸ’‘ Explanation: OCSP responders typically operate on port 80 to provide certificate revocation status.


101. Which of the following protocols is often used for secure file transfer over SSH?

πŸ”˜ A) SCP
πŸ”˜ B) FTP
πŸ”˜ C) Telnet
πŸ”˜ D) HTTP

βœ… Answer: A) SCP
πŸ’‘ Explanation: SCP (Secure Copy Protocol) is used for securely transferring files over SSH.


102. What does the “S” in SSL/TLS stand for?

πŸ”˜ A) Secure
πŸ”˜ B) Session
πŸ”˜ C) System
πŸ”˜ D) Server

βœ… Answer: A) Secure
πŸ’‘ Explanation: SSL/TLS stands for Secure Sockets Layer/Transport Layer Security, which provides encryption and security for network communications.


103. Which TLS version introduced improved security features like 0-RTT?

πŸ”˜ A) TLS 1.0
πŸ”˜ B) TLS 1.1
πŸ”˜ C) TLS 1.2
πŸ”˜ D) TLS 1.3

βœ… Answer: D) TLS 1.3
πŸ’‘ Explanation: TLS 1.3 introduced 0-RTT, reducing connection times and improving security.


104. Which of the following ciphers is most commonly used in modern TLS encryption?

πŸ”˜ A) RC4
πŸ”˜ B) AES
πŸ”˜ C) DES
πŸ”˜ D) 3DES

βœ… Answer: B) AES
πŸ’‘ Explanation: AES (Advanced Encryption Standard) is widely used for secure encryption in modern TLS protocols.


105. What is the primary purpose of a public key in asymmetric encryption?

πŸ”˜ A) To encrypt data
πŸ”˜ B) To decrypt data
πŸ”˜ C) To sign data
πŸ”˜ D) To store session keys

βœ… Answer: A) To encrypt data
πŸ’‘ Explanation: The public key is used to encrypt data, while the private key is used to decrypt it.


106. What is the default port number used for HTTPS?

πŸ”˜ A) 22
πŸ”˜ B) 80
πŸ”˜ C) 443
πŸ”˜ D) 53

βœ… Answer: C) 443
πŸ’‘ Explanation: HTTPS typically runs on port 443, which is used for secure web communication.


107. Which of the following tools is commonly used to generate PGP keys?

πŸ”˜ A) OpenSSL
πŸ”˜ B) GPG
πŸ”˜ C) SSL Labs
πŸ”˜ D) Nmap

βœ… Answer: B) GPG
πŸ’‘ Explanation: GPG (GNU Privacy Guard) is commonly used to generate and manage PGP keys for encryption and signing.


108. What is the difference between SSH and SFTP?

πŸ”˜ A) SSH is for secure login, and SFTP is for file transfers
πŸ”˜ B) SFTP provides a faster transfer rate than SSH
πŸ”˜ C) SSH uses TLS encryption, while SFTP uses AES
πŸ”˜ D) SFTP is only for encrypted email communication

βœ… Answer: A) SSH is for secure login, and SFTP is for file transfers
πŸ’‘ Explanation: SSH is used for secure remote login and command execution, while SFTP (Secure File Transfer Protocol) is used for secure file transfers over SSH.


109. Which of the following is a commonly used method for SSH key management?

πŸ”˜ A) SSH-agent
πŸ”˜ B) FTP
πŸ”˜ C) SSL/TLS
πŸ”˜ D) RSA token

βœ… Answer: A) SSH-agent
πŸ’‘ Explanation: The SSH-agent stores private SSH keys securely in memory, allowing automatic authentication.


110. What is the purpose of a PGP key pair?

πŸ”˜ A) To encrypt the contents of a file
πŸ”˜ B) To provide authentication for SSH sessions
πŸ”˜ C) To create digital signatures for emails and files
πŸ”˜ D) To prevent SSL/TLS session hijacking

βœ… Answer: C) To create digital signatures for emails and files
πŸ’‘ Explanation: PGP key pairs are used to encrypt and sign emails and files, providing authentication and integrity.


111. Which type of attack can occur if SSL/TLS certificates are not properly verified?

πŸ”˜ A) Man-in-the-Middle (MITM)
πŸ”˜ B) Cross-Site Scripting (XSS)
πŸ”˜ C) SQL Injection
πŸ”˜ D) Denial of Service (DoS)

βœ… Answer: A) Man-in-the-Middle (MITM)
πŸ’‘ Explanation: MITM attacks can occur if the SSL/TLS certificate is not verified properly, allowing attackers to intercept and alter communications.


112. What is the role of a Certificate Authority (CA) in SSL/TLS communication?

πŸ”˜ A) To encrypt SSL traffic
πŸ”˜ B) To generate private keys
πŸ”˜ C) To issue digital certificates for websites
πŸ”˜ D) To monitor SSL traffic for vulnerabilities

βœ… Answer: C) To issue digital certificates for websites
πŸ’‘ Explanation: Certificate Authorities (CAs) issue digital certificates that verify the identity of websites and facilitate secure SSL/TLS connections.


113. What does SSL stripping do?

πŸ”˜ A) Encrypts HTTP traffic to make it secure
πŸ”˜ B) Downgrades an HTTPS connection to HTTP
πŸ”˜ C) Secures FTP sessions
πŸ”˜ D) Changes the encryption algorithm of SSL/TLS

βœ… Answer: B) Downgrades an HTTPS connection to HTTP
πŸ’‘ Explanation: SSL stripping is an attack that downgrades a secure HTTPS connection to HTTP, making data vulnerable to interception.


114. Which of the following is the most secure key exchange mechanism used in TLS 1.3?

πŸ”˜ A) RSA key exchange
πŸ”˜ B) Diffie-Hellman key exchange
πŸ”˜ C) Elliptic Curve Diffie-Hellman (ECDHE)
πŸ”˜ D) Static Diffie-Hellman

βœ… Answer: C) Elliptic Curve Diffie-Hellman (ECDHE)
πŸ’‘ Explanation: ECDHE (Elliptic Curve Diffie-Hellman Ephemeral) provides Forward Secrecy and is the most secure key exchange method used in TLS 1.3.


115. What does the ssh-copy-id command do?

πŸ”˜ A) Copies a public SSH key to a remote system for authentication
πŸ”˜ B) Copies a file securely to a remote system
πŸ”˜ C) Verifies the fingerprint of an SSH key
πŸ”˜ D) Generates a new SSH key pair

βœ… Answer: A) Copies a public SSH key to a remote system for authentication
πŸ’‘ Explanation: The ssh-copy-id command installs a public SSH key on a remote system for passwordless authentication.


116. What is the key difference between SSH and SSL/TLS?

πŸ”˜ A) SSH is used for file transfers, while SSL/TLS is used for web traffic
πŸ”˜ B) SSH encrypts web traffic, while SSL/TLS is for remote logins
πŸ”˜ C) SSH uses symmetric encryption, while SSL/TLS uses asymmetric encryption
πŸ”˜ D) SSH is used for remote login and command execution, while SSL/TLS secures web traffic

βœ… Answer: D) SSH is used for remote login and command execution, while SSL/TLS secures web traffic
πŸ’‘ Explanation: SSH is used for remote logins and command execution, while SSL/TLS secures web traffic.


117. Which of the following is the most secure hashing algorithm used in SSL/TLS for integrity checks?

πŸ”˜ A) MD5
πŸ”˜ B) SHA-1
πŸ”˜ C) SHA-256
πŸ”˜ D) SHA-512

βœ… Answer: C) SHA-256
πŸ’‘ Explanation: SHA-256 is the most commonly used hashing algorithm for integrity checks in SSL/TLS.


118. Which TLS cipher suite provides both encryption and integrity protection?

πŸ”˜ A) RSA
πŸ”˜ B) AES-GCM
πŸ”˜ C) ECDSA
πŸ”˜ D) SHA-1

βœ… Answer: B) AES-GCM
πŸ’‘ Explanation: AES-GCM (Advanced Encryption Standard with Galois/Counter Mode) provides both encryption and integrity protection.


119. What is the main purpose of OCSP (Online Certificate Status Protocol)?

πŸ”˜ A) To verify SSL/TLS certificate expiration dates
πŸ”˜ B) To check the revocation status of SSL/TLS certificates
πŸ”˜ C) To store SSL/TLS certificates
πŸ”˜ D) To sign SSL/TLS certificates

βœ… Answer: B) To check the revocation status of SSL/TLS certificates
πŸ’‘ Explanation: OCSP is used to check whether an SSL/TLS certificate has been revoked by the issuing Certificate Authority (CA).


120. Which SSH authentication method uses cryptographic keys instead of passwords?

πŸ”˜ A) Public-key authentication
πŸ”˜ B) Password-based authentication
πŸ”˜ C) Two-factor authentication
πŸ”˜ D) Challenge-response authentication

βœ… Answer: A) Public-key authentication
πŸ’‘ Explanation: Public-key authentication uses a private/public key pair instead of passwords for secure SSH authentication.


121. What is the primary role of a TLS handshake?

πŸ”˜ A) Encrypt data transmission
πŸ”˜ B) Authenticate the client and server and negotiate encryption parameters
πŸ”˜ C) Store session keys for later use
πŸ”˜ D) Verify the client’s IP address

βœ… Answer: B) Authenticate the client and server and negotiate encryption parameters
πŸ’‘ Explanation: The TLS handshake is used to authenticate both parties and establish encryption settings before data transfer.


122. What does SSH port forwarding allow?

πŸ”˜ A) Running a web server over SSH
πŸ”˜ B) Encrypting FTP transfers
πŸ”˜ C) Securely tunneling network traffic through an SSH connection
πŸ”˜ D) Automating SSH authentication

βœ… Answer: C) Securely tunneling network traffic through an SSH connection
πŸ’‘ Explanation: SSH port forwarding (tunneling) allows secure routing of network traffic through an SSH connection.


123. What is the main advantage of Elliptic Curve Cryptography (ECC) over RSA in TLS?

πŸ”˜ A) It is more resistant to quantum computing attacks
πŸ”˜ B) It provides stronger security with smaller key sizes
πŸ”˜ C) It does not require key exchange
πŸ”˜ D) It is faster for encryption but slower for decryption

βœ… Answer: B) It provides stronger security with smaller key sizes
πŸ’‘ Explanation: ECC (Elliptic Curve Cryptography) provides strong security with smaller key sizes, making it more efficient than RSA.


124. Which SSH key type is recommended for maximum security?

πŸ”˜ A) RSA (2048-bit)
πŸ”˜ B) DSA (1024-bit)
πŸ”˜ C) Ed25519
πŸ”˜ D) MD5

βœ… Answer: C) Ed25519
πŸ’‘ Explanation: Ed25519 is a modern and secure SSH key algorithm, offering high security and fast performance.


125. What is the main purpose of Transport Layer Security (TLS)?

πŸ”˜ A) Encrypting and securing data in transit
πŸ”˜ B) Encrypting stored data
πŸ”˜ C) Generating cryptographic hashes
πŸ”˜ D) Creating symmetric encryption keys

βœ… Answer: A) Encrypting and securing data in transit
πŸ’‘ Explanation: TLS is used to encrypt network traffic, ensuring secure communication between clients and servers.


126. What does the SSH -L option do?

πŸ”˜ A) Enables logging for SSH
πŸ”˜ B) Starts an SSH listener for incoming connections
πŸ”˜ C) Creates a local port forwarding tunnel
πŸ”˜ D) Lists all active SSH sessions

βœ… Answer: C) Creates a local port forwarding tunnel
πŸ’‘ Explanation: The ssh -L option is used for local port forwarding, allowing a remote service to be accessed securely.


127. Which attack exploits the vulnerability in SSL/TLS renegotiation?

πŸ”˜ A) POODLE
πŸ”˜ B) BEAST
πŸ”˜ C) Triple Handshake Attack
πŸ”˜ D) Heartbleed

βœ… Answer: C) Triple Handshake Attack
πŸ’‘ Explanation: The Triple Handshake Attack allows an attacker to intercept and manipulate TLS connections by exploiting session renegotiation.


128. What is the purpose of a root certificate in SSL/TLS?

πŸ”˜ A) To encrypt user data
πŸ”˜ B) To validate and sign other certificates in the trust hierarchy
πŸ”˜ C) To store SSL keys
πŸ”˜ D) To manage TLS handshakes

βœ… Answer: B) To validate and sign other certificates in the trust hierarchy
πŸ’‘ Explanation: A root certificate is the top-level certificate in a Public Key Infrastructure (PKI) and is used to sign and validate other certificates.


129. What is the main purpose of the .ssh/authorized_keys file in SSH?

πŸ”˜ A) To store SSH client configuration
πŸ”˜ B) To list public keys authorized for SSH login
πŸ”˜ C) To generate new SSH keys
πŸ”˜ D) To store SSH logs

βœ… Answer: B) To list public keys authorized for SSH login
πŸ’‘ Explanation: The .ssh/authorized_keys file contains public keys that are allowed to authenticate without a password.


130. What is Forward Secrecy in SSL/TLS?

πŸ”˜ A) The ability to reuse session keys for faster encryption
πŸ”˜ B) The protection of past communications even if the private key is compromised
πŸ”˜ C) The automatic renewal of SSL certificates
πŸ”˜ D) The use of self-signed certificates

βœ… Answer: B) The protection of past communications even if the private key is compromised
πŸ’‘ Explanation: Forward Secrecy ensures that past encrypted sessions remain secure, even if the private key is later compromised.


131. What is the recommended way to disable weak ciphers in an SSH server?

πŸ”˜ A) Using Ciphers directive in sshd_config
πŸ”˜ B) Changing the SSH port to a non-standard one
πŸ”˜ C) Running SSH in debug mode
πŸ”˜ D) Disabling password authentication

βœ… Answer: A) Using Ciphers directive in sshd_config
πŸ’‘ Explanation: The Ciphers directive in sshd_config is used to disable weak encryption algorithms in SSH.


132. What does the TLS “Certificate Transparency” mechanism prevent?

πŸ”˜ A) Unauthorized certificate issuance
πŸ”˜ B) DNS spoofing attacks
πŸ”˜ C) SQL injection attacks
πŸ”˜ D) Side-channel attacks

βœ… Answer: A) Unauthorized certificate issuance
πŸ’‘ Explanation: Certificate Transparency (CT) helps detect and prevent fraudulent certificate issuance by maintaining public logs of issued certificates.


133. What is the function of gpg --list-keys in PGP?

πŸ”˜ A) Encrypts a message
πŸ”˜ B) Lists all stored PGP keys
πŸ”˜ C) Generates a new key pair
πŸ”˜ D) Deletes a public key

βœ… Answer: B) Lists all stored PGP keys
πŸ’‘ Explanation: The gpg --list-keys command is used to display all PGP keys stored in a user’s keyring.


134. What does the TLS_FALLBACK_SCSV mechanism prevent?

πŸ”˜ A) TLS downgrade attacks
πŸ”˜ B) MITM attacks
πŸ”˜ C) Certificate spoofing
πŸ”˜ D) Key exchange failures

βœ… Answer: A) TLS downgrade attacks
πŸ’‘ Explanation: TLS_FALLBACK_SCSV is a security measure that prevents forced downgrades to weaker TLS versions.


135. What is the recommended replacement for SHA-1 in TLS?

πŸ”˜ A) MD5
πŸ”˜ B) SHA-256
πŸ”˜ C) AES-128
πŸ”˜ D) RSA

βœ… Answer: B) SHA-256
πŸ’‘ Explanation: SHA-256 is recommended to replace the deprecated SHA-1 in modern TLS implementations.


136. What is the purpose of the SSH -N flag?

πŸ”˜ A) Disables encryption
πŸ”˜ B) Prevents remote commands from executing
πŸ”˜ C) Disables password authentication
πŸ”˜ D) Enables verbose logging

βœ… Answer: B) Prevents remote commands from executing
πŸ’‘ Explanation: The ssh -N option is used to set up SSH tunneling without executing remote commands.


137. What is the purpose of HSTS in web security?

πŸ”˜ A) To prevent HTTPS downgrade attacks
πŸ”˜ B) To encrypt email communication
πŸ”˜ C) To validate SSH fingerprints
πŸ”˜ D) To generate TLS keys

βœ… Answer: A) To prevent HTTPS downgrade attacks
πŸ’‘ Explanation: HSTS (HTTP Strict Transport Security) forces browsers to use HTTPS, preventing downgrade attacks.


138. Which of the following is a major improvement in TLS 1.3?

πŸ”˜ A) Removal of insecure ciphers
πŸ”˜ B) Faster handshakes
πŸ”˜ C) Stronger encryption algorithms
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ’‘ Explanation: TLS 1.3 improves security, speed, and efficiency by removing insecure ciphers, reducing handshake latency, and enhancing encryption.


141. What does SSH multiplexing help with?

πŸ”˜ A) Running multiple SSH commands without establishing a new connection each time
πŸ”˜ B) Encrypting SSH keys
πŸ”˜ C) Increasing the security of SSH connections
πŸ”˜ D) Preventing SSH session hijacking

βœ… Answer: A) Running multiple SSH commands without establishing a new connection each time
πŸ’‘ Explanation: SSH multiplexing allows multiple SSH sessions to reuse the same TCP connection, reducing overhead.


142. What is the primary purpose of a wildcard SSL certificate?

πŸ”˜ A) To secure multiple subdomains under the same domain
πŸ”˜ B) To provide stronger encryption than regular certificates
πŸ”˜ C) To support multiple key exchange mechanisms
πŸ”˜ D) To encrypt TLS handshakes

βœ… Answer: A) To secure multiple subdomains under the same domain
πŸ’‘ Explanation: Wildcard SSL certificates can secure all subdomains of a domain (e.g., *.example.com).


143. Which SSH option is used to specify an identity file for authentication?

πŸ”˜ A) -p
πŸ”˜ B) -i
πŸ”˜ C) -X
πŸ”˜ D) -L

βœ… Answer: B) -i
πŸ’‘ Explanation: The -i flag allows SSH users to specify a private key file for authentication.


144. What is the default validity period of an SSL/TLS certificate issued by a Certificate Authority (CA)?

πŸ”˜ A) 90 days
πŸ”˜ B) 1 year
πŸ”˜ C) 2 years
πŸ”˜ D) 10 years

βœ… Answer: B) 1 year
πŸ’‘ Explanation: As per recent guidelines, SSL/TLS certificates issued by CAs typically have a maximum validity of 1 year.


145. What feature in TLS 1.3 replaces the traditional RSA key exchange?

πŸ”˜ A) Ephemeral Diffie-Hellman (DHE)
πŸ”˜ B) Pre-shared keys
πŸ”˜ C) Elliptic Curve Diffie-Hellman (ECDHE)
πŸ”˜ D) Static RSA

βœ… Answer: C) Elliptic Curve Diffie-Hellman (ECDHE)
πŸ’‘ Explanation: TLS 1.3 removed RSA key exchange and replaced it with ECDHE, which provides Forward Secrecy.


146. What is the primary function of the ssh-agent program?

πŸ”˜ A) To store decrypted SSH private keys securely in memory
πŸ”˜ B) To generate SSH keys
πŸ”˜ C) To copy SSH keys to a remote server
πŸ”˜ D) To encrypt SSH traffic

βœ… Answer: A) To store decrypted SSH private keys securely in memory
πŸ’‘ Explanation: ssh-agent allows users to store private keys so they don’t have to enter passphrases repeatedly.


147. Which of the following is a common risk of self-signed SSL certificates?

πŸ”˜ A) They are not trusted by default in web browsers
πŸ”˜ B) They have shorter expiration periods
πŸ”˜ C) They provide weaker encryption
πŸ”˜ D) They require manual installation on all clients

βœ… Answer: A) They are not trusted by default in web browsers
πŸ’‘ Explanation: Self-signed certificates are not issued by a trusted Certificate Authority (CA), leading to browser security warnings.


148. What is the primary function of the sshd_config file?

πŸ”˜ A) To configure the SSH client
πŸ”˜ B) To configure the SSH server
πŸ”˜ C) To store private SSH keys
πŸ”˜ D) To monitor SSH logs

βœ… Answer: B) To configure the SSH server
πŸ’‘ Explanation: The /etc/ssh/sshd_config file controls SSH server settings, including authentication and encryption settings.


149. What attack exploits vulnerabilities in SSL/TLS compression mechanisms?

πŸ”˜ A) BEAST
πŸ”˜ B) POODLE
πŸ”˜ C) CRIME
πŸ”˜ D) Heartbleed

βœ… Answer: C) CRIME
πŸ’‘ Explanation: The CRIME attack exploits vulnerabilities in TLS compression, allowing attackers to recover session cookies.


150. What is the purpose of an HMAC in SSH?

πŸ”˜ A) To verify data integrity
πŸ”˜ B) To encrypt SSH traffic
πŸ”˜ C) To generate SSH keys
πŸ”˜ D) To enable Forward Secrecy

βœ… Answer: A) To verify data integrity
πŸ’‘ Explanation: HMAC (Hash-based Message Authentication Code) is used in SSH to ensure message integrity.


151. What is the primary benefit of using TLS session tickets?

πŸ”˜ A) Faster reconnection times
πŸ”˜ B) Stronger encryption
πŸ”˜ C) Forward Secrecy
πŸ”˜ D) Protection against MITM attacks

βœ… Answer: A) Faster reconnection times
πŸ’‘ Explanation: TLS session tickets allow a client to resume a previous session quickly, reducing the need for a full handshake.


152. What type of encryption does PGP use?

πŸ”˜ A) Only symmetric encryption
πŸ”˜ B) Only asymmetric encryption
πŸ”˜ C) A combination of symmetric and asymmetric encryption
πŸ”˜ D) Hashing only

βœ… Answer: C) A combination of symmetric and asymmetric encryption
πŸ’‘ Explanation: PGP encrypts messages using symmetric encryption, and then asymmetrically encrypts the session key.


153. What command lists the fingerprints of known SSH host keys?

πŸ”˜ A) ssh -K
πŸ”˜ B) ssh-keygen -l
πŸ”˜ C) ssh-agent -L
πŸ”˜ D) ssh-add -F

βœ… Answer: B) ssh-keygen -l
πŸ’‘ Explanation: The ssh-keygen -l command displays the fingerprint of an SSH public key.


154. Which TLS version deprecated weak ciphers like RC4 and MD5?

πŸ”˜ A) TLS 1.1
πŸ”˜ B) TLS 1.2
πŸ”˜ C) TLS 1.3
πŸ”˜ D) SSL 3.0

βœ… Answer: B) TLS 1.2
πŸ’‘ Explanation: TLS 1.2 deprecated insecure ciphers like RC4 and MD5, enhancing security.


155. What does gpg --sign do?

πŸ”˜ A) Encrypts a message
πŸ”˜ B) Creates a digital signature for a file
πŸ”˜ C) Decrypts a file
πŸ”˜ D) Lists PGP keys

βœ… Answer: B) Creates a digital signature for a file
πŸ’‘ Explanation: The gpg --sign command generates a PGP digital signature, verifying file authenticity.


156. What does SSH X11 forwarding allow?

πŸ”˜ A) Running graphical applications over SSH
πŸ”˜ B) Faster SSH key exchange
πŸ”˜ C) Encrypting all SSH sessions
πŸ”˜ D) Secure remote file transfers

βœ… Answer: A) Running graphical applications over SSH
πŸ’‘ Explanation: X11 forwarding enables users to run graphical applications remotely over SSH.


157. What is a common attack against weak SSH passwords?

πŸ”˜ A) Brute-force attack
πŸ”˜ B) DNS spoofing
πŸ”˜ C) TLS downgrade
πŸ”˜ D) Clickjacking

βœ… Answer: A) Brute-force attack
πŸ’‘ Explanation: Attackers attempt to guess weak SSH passwords using brute-force methods.


158. What does the ssh -o option do?

πŸ”˜ A) Specifies an SSH configuration option
πŸ”˜ B) Enables verbose logging
πŸ”˜ C) Disables authentication
πŸ”˜ D) Encrypts SSH traffic

βœ… Answer: A) Specifies an SSH configuration option
πŸ’‘ Explanation: The ssh -o option allows users to define specific SSH settings in a command-line session.


159. Which component of TLS handles encryption?

πŸ”˜ A) TLS Record Protocol
πŸ”˜ B) TLS Handshake Protocol
πŸ”˜ C) OCSP
πŸ”˜ D) HSTS

βœ… Answer: A) TLS Record Protocol
πŸ’‘ Explanation: The TLS Record Protocol encrypts and secures transmitted data.


160. What is the purpose of a client certificate in TLS?

πŸ”˜ A) To authenticate the client to the server
πŸ”˜ B) To encrypt data
πŸ”˜ C) To sign server certificates
πŸ”˜ D) To verify TLS ciphers

βœ… Answer: A) To authenticate the client to the server
πŸ’‘ Explanation: Client certificates are used in mutual TLS authentication to verify client identity.


161. What is the primary function of an SSH jump server?

πŸ”˜ A) To act as an intermediary for accessing internal systems securely
πŸ”˜ B) To encrypt SSH private keys
πŸ”˜ C) To store SSH logs
πŸ”˜ D) To block brute-force attacks

βœ… Answer: A) To act as an intermediary for accessing internal systems securely
πŸ’‘ Explanation: An SSH jump server is used to provide controlled access to internal systems, reducing direct exposure.


162. Which OpenSSL command is used to generate a new RSA private key?

πŸ”˜ A) openssl genrsa -out key.pem 2048
πŸ”˜ B) openssl enc -rsa -genkey
πŸ”˜ C) openssl create-key -rsa
πŸ”˜ D) openssl generate-rsa 4096

βœ… Answer: A) openssl genrsa -out key.pem 2048
πŸ’‘ Explanation: The openssl genrsa command generates an RSA private key, specifying the key size (e.g., 2048-bit).


163. What type of key does SSH use for secure authentication?

πŸ”˜ A) Symmetric key
πŸ”˜ B) Public-private key pair
πŸ”˜ C) AES key
πŸ”˜ D) TLS session key

βœ… Answer: B) Public-private key pair
πŸ’‘ Explanation: SSH uses public-private key pairs to authenticate users securely.


164. What does the TLS “Finished” message indicate?

πŸ”˜ A) The handshake is complete, and encryption can begin
πŸ”˜ B) The TLS session has been terminated
πŸ”˜ C) The certificate is verified
πŸ”˜ D) The client and server have agreed on a new session key

βœ… Answer: A) The handshake is complete, and encryption can begin
πŸ’‘ Explanation: The TLS “Finished” message signifies the successful completion of the handshake, allowing encrypted communication to begin.


165. What SSH option prevents a remote command from being executed?

πŸ”˜ A) ssh -N
πŸ”˜ B) ssh -X
πŸ”˜ C) ssh -R
πŸ”˜ D) ssh -L

βœ… Answer: A) ssh -N
πŸ’‘ Explanation: The ssh -N option is used when setting up SSH tunnels without executing any remote command.


166. What type of TLS certificate is required for EV (Extended Validation) status?

πŸ”˜ A) Self-signed certificate
πŸ”˜ B) Wildcard certificate
πŸ”˜ C) Organization Validated (OV) certificate
πŸ”˜ D) Extended Validation (EV) certificate

βœ… Answer: D) Extended Validation (EV) certificate
πŸ’‘ Explanation: EV certificates require strict identity verification and display a trust indicator in browsers.


167. What is the primary purpose of an SSH bastion host?

πŸ”˜ A) To provide controlled access to internal networks
πŸ”˜ B) To generate encryption keys
πŸ”˜ C) To encrypt all SSH sessions
πŸ”˜ D) To act as a load balancer

βœ… Answer: A) To provide controlled access to internal networks
πŸ’‘ Explanation: A bastion host is a hardened system that acts as an access gateway to internal systems.


168. What is the default port for the OCSP protocol?

πŸ”˜ A) 80
πŸ”˜ B) 443
πŸ”˜ C) 21
πŸ”˜ D) 53

βœ… Answer: A) 80
πŸ’‘ Explanation: OCSP (Online Certificate Status Protocol) typically operates on port 80 for certificate status checks.


169. What does the Strict-Transport-Security header prevent?

πŸ”˜ A) HTTPS downgrade attacks
πŸ”˜ B) DNS spoofing
πŸ”˜ C) Buffer overflow attacks
πŸ”˜ D) SQL injection

βœ… Answer: A) HTTPS downgrade attacks
πŸ’‘ Explanation: HSTS (HTTP Strict Transport Security) ensures that browsers always use HTTPS, preventing downgrade attacks.


170. Which command is used to generate a new SSH key pair?

πŸ”˜ A) ssh-genkey
πŸ”˜ B) ssh-keygen
πŸ”˜ C) ssh-add
πŸ”˜ D) ssh-copy-id

βœ… Answer: B) ssh-keygen
πŸ’‘ Explanation: The ssh-keygen command is used to generate new SSH key pairs for authentication.


171. What is the function of the tls-prober tool?

πŸ”˜ A) To check for TLS misconfigurations and vulnerabilities
πŸ”˜ B) To monitor SSH sessions
πŸ”˜ C) To generate encryption keys
πŸ”˜ D) To encrypt SSL traffic

βœ… Answer: A) To check for TLS misconfigurations and vulnerabilities
πŸ’‘ Explanation: tls-prober is a security tool that scans servers for TLS-related security flaws.


172. What is the maximum validity of Let’s Encrypt SSL certificates?

πŸ”˜ A) 30 days
πŸ”˜ B) 90 days
πŸ”˜ C) 1 year
πŸ”˜ D) 3 years

βœ… Answer: B) 90 days
πŸ’‘ Explanation: Let’s Encrypt certificates are valid for 90 days and must be renewed frequently.


173. What is the purpose of SSH reverse port forwarding?

πŸ”˜ A) To allow remote systems to access a local service
πŸ”˜ B) To encrypt an SSH session
πŸ”˜ C) To secure web traffic over SSH
πŸ”˜ D) To bypass firewall restrictions

βœ… Answer: A) To allow remote systems to access a local service
πŸ’‘ Explanation: Reverse SSH port forwarding allows remote systems to connect back to a local service.


174. What protocol does SSH use for key exchange?

πŸ”˜ A) AES
πŸ”˜ B) RSA
πŸ”˜ C) Diffie-Hellman
πŸ”˜ D) SHA-256

βœ… Answer: C) Diffie-Hellman
πŸ’‘ Explanation: SSH uses Diffie-Hellman key exchange to securely establish a shared session key.


175. What feature in TLS 1.3 significantly improves security?

πŸ”˜ A) Removal of RSA key exchange
πŸ”˜ B) Faster handshake process
πŸ”˜ C) Improved cipher selection
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ’‘ Explanation: TLS 1.3 introduced improved security by removing RSA key exchange, speeding up the handshake, and enhancing cipher security.


176. Which hashing algorithm is used in TLS 1.3 for integrity verification?

πŸ”˜ A) MD5
πŸ”˜ B) SHA-256
πŸ”˜ C) SHA-1
πŸ”˜ D) Blowfish

βœ… Answer: B) SHA-256
πŸ’‘ Explanation: TLS 1.3 uses SHA-256 for integrity verification to protect against tampering.


177. What is the primary advantage of using a VPN over SSH tunneling for secure connections?

πŸ”˜ A) VPN can encrypt all network traffic
πŸ”˜ B) SSH is slower than VPN
πŸ”˜ C) VPN provides stronger encryption
πŸ”˜ D) SSH cannot be used for encryption

βœ… Answer: A) VPN can encrypt all network traffic
πŸ’‘ Explanation: A VPN encrypts all network traffic, while SSH tunneling only encrypts specific traffic.


178. What is the function of gpg --decrypt?

πŸ”˜ A) Encrypts a file
πŸ”˜ B) Decrypts a PGP-encrypted file
πŸ”˜ C) Generates a new PGP key
πŸ”˜ D) Exports a public key

βœ… Answer: B) Decrypts a PGP-encrypted file
πŸ’‘ Explanation: The gpg --decrypt command is used to decrypt files encrypted using PGP.


179. What is the primary weakness of using a self-signed SSL certificate?

πŸ”˜ A) It is not trusted by browsers
πŸ”˜ B) It has weaker encryption
πŸ”˜ C) It cannot be revoked
πŸ”˜ D) It expires faster than CA-issued certificates

βœ… Answer: A) It is not trusted by browsers
πŸ’‘ Explanation: Self-signed certificates are not issued by a trusted CA, making them untrusted in browsers.


180. What does OCSP (Online Certificate Status Protocol) check?

πŸ”˜ A) Whether an SSL certificate is revoked
πŸ”˜ B) The expiration date of a certificate
πŸ”˜ C) The encryption strength of TLS
πŸ”˜ D) The hostname in a TLS certificate

βœ… Answer: A) Whether an SSL certificate is revoked
πŸ’‘ Explanation: OCSP checks whether a certificate has been revoked before its expiration date.


181. What is the purpose of TLS Server Name Indication (SNI)?

πŸ”˜ A) To allow multiple SSL certificates on the same IP address
πŸ”˜ B) To encrypt DNS queries
πŸ”˜ C) To enforce mutual authentication
πŸ”˜ D) To improve SSL handshake speed

βœ… Answer: A) To allow multiple SSL certificates on the same IP address
πŸ’‘ Explanation: SNI (Server Name Indication) enables a single server to host multiple SSL/TLS certificates for different domains.


182. What does the SSH -T option do?

πŸ”˜ A) Disables pseudo-terminal allocation
πŸ”˜ B) Enables X11 forwarding
πŸ”˜ C) Forces password authentication
πŸ”˜ D) Lists active SSH sessions

βœ… Answer: A) Disables pseudo-terminal allocation
πŸ’‘ Explanation: The ssh -T option prevents SSH from allocating a pseudo-terminal, often used in automation scripts.


183. What is the primary goal of SSL/TLS renegotiation?

πŸ”˜ A) To refresh encryption keys during a session
πŸ”˜ B) To extend the validity of a TLS certificate
πŸ”˜ C) To speed up HTTPS connections
πŸ”˜ D) To force certificate re-validation

βœ… Answer: A) To refresh encryption keys during a session
πŸ’‘ Explanation: SSL/TLS renegotiation allows refreshing session keys for additional security.


184. Which SSH authentication method is the most secure?

πŸ”˜ A) Password authentication
πŸ”˜ B) Public-key authentication
πŸ”˜ C) Challenge-response authentication
πŸ”˜ D) Plaintext authentication

βœ… Answer: B) Public-key authentication
πŸ’‘ Explanation: Public-key authentication is the most secure SSH authentication method as it eliminates password-based attacks.


185. What does the tlsdate tool do?

πŸ”˜ A) Synchronizes system time securely using TLS
πŸ”˜ B) Generates TLS keys
πŸ”˜ C) Checks SSL certificate expiration
πŸ”˜ D) Encrypts SSH traffic

βœ… Answer: A) Synchronizes system time securely using TLS
πŸ’‘ Explanation: tlsdate synchronizes system time by securely retrieving it from TLS-enabled servers.


186. What is the function of OCSP stapling?

πŸ”˜ A) Reduces the need for real-time OCSP requests
πŸ”˜ B) Encrypts TLS handshakes
πŸ”˜ C) Prevents certificate spoofing
πŸ”˜ D) Provides automatic certificate renewal

βœ… Answer: A) Reduces the need for real-time OCSP requests
πŸ’‘ Explanation: OCSP stapling allows a web server to pre-fetch the OCSP response and send it during the TLS handshake.


187. What command is used to force SSH to use a specific private key?

πŸ”˜ A) ssh -k
πŸ”˜ B) ssh -i
πŸ”˜ C) ssh -P
πŸ”˜ D) ssh -X

βœ… Answer: B) ssh -i
πŸ’‘ Explanation: The ssh -i option specifies a custom private key file for authentication.


188. What does the TLS_PSK cipher suite use for authentication?

πŸ”˜ A) Pre-shared keys
πŸ”˜ B) RSA certificates
πŸ”˜ C) Diffie-Hellman key exchange
πŸ”˜ D) HMAC

βœ… Answer: A) Pre-shared keys
πŸ’‘ Explanation: The TLS_PSK cipher suite uses Pre-Shared Keys (PSK) instead of public-key cryptography.


189. What is a common vulnerability in older versions of SSL/TLS?

πŸ”˜ A) Lack of Forward Secrecy
πŸ”˜ B) Weak encryption algorithms
πŸ”˜ C) Susceptibility to MITM attacks
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ’‘ Explanation: Older SSL/TLS versions suffer from weak encryption, lack of Forward Secrecy, and vulnerabilities to MITM attacks.


190. What protocol replaces SSL in modern secure communications?

πŸ”˜ A) IPSec
πŸ”˜ B) TLS
πŸ”˜ C) SSH
πŸ”˜ D) VPN

βœ… Answer: B) TLS
πŸ’‘ Explanation: TLS (Transport Layer Security) is the modern replacement for the outdated SSL protocol.


191. What is the primary risk of using expired SSL/TLS certificates?

πŸ”˜ A) Reduced encryption strength
πŸ”˜ B) Certificate errors and trust issues
πŸ”˜ C) Increased website speed
πŸ”˜ D) Faster handshake times

βœ… Answer: B) Certificate errors and trust issues
πŸ’‘ Explanation: Expired SSL/TLS certificates cause trust errors, leading to browser security warnings.


192. What is the default SSH key file name for RSA authentication?

πŸ”˜ A) id_ecdsa
πŸ”˜ B) id_dsa
πŸ”˜ C) id_rsa
πŸ”˜ D) id_ed25519

βœ… Answer: C) id_rsa
πŸ’‘ Explanation: RSA keys are stored in ~/.ssh/id_rsa for SSH authentication.


193. What is the purpose of ssh-copy-id?

πŸ”˜ A) To copy public SSH keys to a remote host for authentication
πŸ”˜ B) To generate new SSH keys
πŸ”˜ C) To delete SSH keys from a remote server
πŸ”˜ D) To list all stored SSH keys

βœ… Answer: A) To copy public SSH keys to a remote host for authentication
πŸ’‘ Explanation: ssh-copy-id simplifies public key authentication by copying public SSH keys to remote servers.


194. Which hashing algorithm was removed from TLS 1.3?

πŸ”˜ A) SHA-256
πŸ”˜ B) MD5
πŸ”˜ C) SHA-3
πŸ”˜ D) Whirlpool

βœ… Answer: B) MD5
πŸ’‘ Explanation: TLS 1.3 removed MD5 due to its weaknesses in collision attacks.


195. What is the primary use of gpg --armor?

πŸ”˜ A) To export keys in ASCII format
πŸ”˜ B) To encrypt files
πŸ”˜ C) To sign emails
πŸ”˜ D) To generate PGP keys

βœ… Answer: A) To export keys in ASCII format
πŸ’‘ Explanation: The gpg --armor option exports keys and messages in ASCII format, making them more portable.


196. What is the main benefit of TLS session resumption?

πŸ”˜ A) Faster reconnection times
πŸ”˜ B) Increased encryption strength
πŸ”˜ C) Automatic certificate renewal
πŸ”˜ D) Reduced need for HSTS

βœ… Answer: A) Faster reconnection times
πŸ’‘ Explanation: TLS session resumption speeds up subsequent connections by reusing previously established session parameters.


197. What does the ssh -q option do?

πŸ”˜ A) Runs SSH in quiet mode, suppressing warnings and errors
πŸ”˜ B) Lists active SSH keys
πŸ”˜ C) Enables verbose logging
πŸ”˜ D) Forces password authentication

βœ… Answer: A) Runs SSH in quiet mode, suppressing warnings and errors
πŸ’‘ Explanation: The ssh -q option suppresses output messages, making SSH connections quieter.


198. What is the purpose of an Extended Validation (EV) TLS certificate?

πŸ”˜ A) To provide strict identity verification for organizations
πŸ”˜ B) To increase encryption strength
πŸ”˜ C) To support wildcard domains
πŸ”˜ D) To enable Forward Secrecy

βœ… Answer: A) To provide strict identity verification for organizations
πŸ’‘ Explanation: EV TLS certificates require rigorous identity verification before being issued.


199. Which TLS extension prevents downgrade attacks?

πŸ”˜ A) TLS_FALLBACK_SCSV
πŸ”˜ B) OCSP Stapling
πŸ”˜ C) SNI
πŸ”˜ D) PFS

βœ… Answer: A) TLS_FALLBACK_SCSV
πŸ’‘ Explanation: TLS_FALLBACK_SCSV prevents protocol downgrade attacks by ensuring clients do not fall back to weaker TLS versions.


200. What does gpg --delete-key do?

πŸ”˜ A) Removes a PGP key from the keyring
πŸ”˜ B) Revokes a PGP key
πŸ”˜ C) Encrypts a file
πŸ”˜ D) Lists available keys

βœ… Answer: A) Removes a PGP key from the keyring
πŸ’‘ Explanation: The gpg --delete-key command removes a stored PGP key from the local keyring.


201. What is the purpose of the SSH -C option?

πŸ”˜ A) Enables compression for SSH connections
πŸ”˜ B) Copies SSH keys to a remote server
πŸ”˜ C) Forces password authentication
πŸ”˜ D) Disables encryption for faster connections

βœ… Answer: A) Enables compression for SSH connections
πŸ’‘ Explanation: The ssh -C option enables compression, which can improve performance on low-bandwidth networks.


202. What is the primary benefit of using TLS 1.3 over TLS 1.2?

πŸ”˜ A) Improved handshake speed and security
πŸ”˜ B) Support for older cipher suites
πŸ”˜ C) More reliance on RSA key exchange
πŸ”˜ D) Increased key sizes for SSL certificates

βœ… Answer: A) Improved handshake speed and security
πŸ’‘ Explanation: TLS 1.3 offers a faster handshake and removes insecure algorithms, making it more secure and efficient than TLS 1.2.


203. What does gpg --edit-key allow you to do?

πŸ”˜ A) Modify or manage PGP key properties
πŸ”˜ B) Encrypt a file using GPG
πŸ”˜ C) Export a GPG key
πŸ”˜ D) Delete a GPG key

βœ… Answer: A) Modify or manage PGP key properties
πŸ’‘ Explanation: The gpg --edit-key command allows users to modify key properties, such as adding new user IDs or revoking keys.


204. What is the purpose of the CipherSuites directive in TLS configurations?

πŸ”˜ A) To specify the list of allowed encryption algorithms
πŸ”˜ B) To manage SSH key authentication
πŸ”˜ C) To enforce SSL certificate renewal
πŸ”˜ D) To store cryptographic keys

βœ… Answer: A) To specify the list of allowed encryption algorithms
πŸ’‘ Explanation: The CipherSuites directive defines which encryption algorithms a TLS server will support, helping enforce security policies.


205. What does an SSH honeypot do?

πŸ”˜ A) Captures unauthorized SSH login attempts for security monitoring
πŸ”˜ B) Encrypts SSH connections with stronger algorithms
πŸ”˜ C) Automatically blocks IP addresses after failed logins
πŸ”˜ D) Creates SSH keys for authentication

βœ… Answer: A) Captures unauthorized SSH login attempts for security monitoring
πŸ’‘ Explanation: An SSH honeypot is a security tool designed to attract and monitor unauthorized SSH login attempts to detect and analyze attack patterns.