PrepAway - Latest Free Exam Questions & Answers

which of the following steps should be performed NEXT t…

A security analyst is reviewing the following log after enabling key-based authentication.

Given the above information, which of the following steps should be performed NEXT to secure the system?

PrepAway - Latest Free Exam Questions & Answers

A.
Disable anonymous SSH logins.

B.
Disable password authentication for SSH.

C.
Disable SSHv1.

D.
Disable remote root SSH logins.

Explanation:


Leave a Reply