The SSH and GnuPG keys can be protected by an optional passphrase. True or False? True False
Which of the following algorithms are not supported by GnuPG for...
Which of the following algorithms are not supported by GnuPG for key generation? DSA Elgamal One...
The gpg command operates in a ____ mode.
The gpg command operates in a ____ mode. verbose interactive silent batch
Which command is used to generate a GnuPG key?
Which command is used to generate a GnuPG key? gpg -gen-key gpg –gen-key gpg-gen –key...
Which is the default configuration file used by GnuPG?
Which is the default configuration file used by GnuPG? ~/.gnu/gpg.conf ~/.gnupg/.gpg.conf...
Which standard is GnuPG based on?
Which standard is GnuPG based on? Linux Good Privacy (LGP) Pretty Good Privacy (PGP) SSH Good...
Which of the following commands will start a SSH session with...
Which of the following commands will start a SSH session with X11 support? ssh -X marks.gsource.com...
Which of the following commands are used to setup SSH tunneling?
Which of the following commands are used to setup SSH tunneling? ssh -p ssh -l ssh -L ssh -t
Which of the following entries in /etc/ssh/sshd_config turn on...
Which of the following entries in /etc/ssh/sshd_config turn on SSH tunneling...
SSH Tunneling is the same as _.
SSH Tunneling is the same as _____. SSH Porting SSH Encoding SSH Encryption SSH Port Forwarding