Try these questions to test your knowledge from this chapter:
- What is a significant downside of using Telnet?
- Which port does SSH typically run on?
- Why is it essential that the client authenticates the SSH server?
- How is the server typically authenticated?
- How is the SSH client typically authenticated?
The answers to this questions can be found in Appendix A, Answers to Questions.