which of the following steps should be performed NEXT t…

A security analyst is reviewing the following log after enabling key-based authentication.

Given the above information, which of the following steps should be performed NEXT to secure the system?

A security analyst is reviewing the following log after enabling key-based authentication.

Given the above information, which of the following steps should be performed NEXT to secure the system?

A.
Disable anonymous SSH logins.

B.
Disable password authentication for SSH.

C.
Disable SSHv1.

D.
Disable remote root SSH logins.

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *