A security-conscious administrator would change which TWO of the following lines found in an SSH configuration file?