Which of the following is a common step for securing SSH-based transmissions?
A.
Enabling SSH version 1
B.
Disabling SSH version 1
C.
Requiring the use of certificates
D.
Requiring standard authentication
Explanation:
Which of the following is a common step for securing SSH-based transmissions?
Which of the following is a common step for securing SSH-based transmissions?
A.
Enabling SSH version 1
B.
Disabling SSH version 1
C.
Requiring the use of certificates
D.
Requiring standard authentication
Explanation: