Which of the following is a common method to secure SSH beyond just password authentication?
- Enforcing key-based authentication
- Using a weak password
- Disabling SSH
- Keeping SSH configuration default
A common method to secure SSH beyond just password authentication is to enforce key-based authentication. This method increases security by requiring users to possess a private key in addition to their password, making it much more difficult for unauthorized users to access the system.
Loading...
Related Quiz
- You've been tasked with setting up a Linux server that can share files with Windows clients in the network, ensuring they can access it seamlessly. Which software would you primarily consider installing?
- To ensure a consistent policy across machines, SELinux policies can be stored in _________ format.
- The iptables command that allows traffic only from a specific IP address, say 10.0.0.1, to a specific port, say 22, uses the ________ option.
- What does the 2>&1 notation signify when used in Linux command redirection?
- If you want to shift the positional parameters to the left, which command would you use?