RHEL5/6 Interview Questions : Remote System Access
1. What is SSH used for?
1a. SSH is used for secure remote management of Linux systems.
2. Should you allow remote root access? Why or why not?
2a. You should never allow remote root access. Should your root account become compromised and you use the same password, someone could gain access to all
your systems. You also don’t want the most powerful user of your system (with no accountability) logging in and making changes.
3. What happens if a host changes its IP address and the keys don’t match?
3a. A large warning message appears indicating that the key doesn’t match the host you are connecting to. You have to remove the key/host pair from the
known_hosts file to proceed.
4. Which version of SSH should you use?
4a. Version 2 is the latest and most secure version of SSH.
5. SSH can run only on TCP port 22. True or False?
5a. False. Through its main config file, SSH can be configured to run on any port you’d like (provided that port is available).
6. TCP Wrappers can be used with SSH. True or False?
6a. True. SSH does support TCP Wrappers.
7. What is the benefit of using public/private key authentication?
7a. Public/private key authentication provides an additional layer of security because you need the correct key instead of just knowing someone’s password. Passwords combined with public/private keys take the security one additional step.
8. What is VNC?
8a. VNC is used to control a remote desktop session.
9. What is the name of the package that allows you to install VNC?
9a. The VNC package for Red Hat Enterprise Linux 6 is tiger-vnc.