Exam4Training

Which of the following should the administrator do NEXT to enforce this new configuration?

A systems administrator wants to disable the use of usernames and passwords for SSH authentication and enforce key-based authentication.

Which of the following should the administrator do NEXT to enforce this new configuration?
A . Issue a public/private keypair for each user and securely distribute a private key to each employee
B . Instruct users on how to create a public/private keypair and install users’ public keys on the
server
C . Disable the username and password authentication and enable TOTP in the sshd.conf file.
D . Change the default SSH port. enable TCP tunneling. and provide a pre-configured SSH client

Answer: D

Latest SY0-501 Dumps Valid Version with 1130 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version