Which of the following actions should the administrator take?

The security administrator notices a user logging into a corporate Unix server remotely as root.

Which of the following actions should the administrator take?

The security administrator notices a user logging into a corporate Unix server remotely as root.

Which of the following actions should the administrator take?

A.
Create a firewall rule to block SSH

B.
Delete the root account

C.
Disable remote root logins

D.
Ensure the root account has a strong password



Leave a Reply 0

Your email address will not be published. Required fields are marked *

10 − 8 =