The root user in an LPAR has the ability to remotely execute CLI commands on an HMC
without being prompted for a password. That capability must be removed in order to comply
with security rules. Which of the following commands describes the supported method to
delete unneeded key from the authorized_keys2 file?

A.
delkey
B.
chkeys
C.
chhmcuser
D.
mkauthkeys
E.
rmauthkeys