Which of the following is a common method to secure SSH beyond just password authentication?

  • Enforcing key-based authentication
  • Using a weak password
  • Disabling SSH
  • Keeping SSH configuration default
A common method to secure SSH beyond just password authentication is to enforce key-based authentication. This method increases security by requiring users to possess a private key in addition to their password, making it much more difficult for unauthorized users to access the system.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *