Which of the following steps should the analyst perform to meet these requirements?

A security analyst Is hardening a Linux workstation and must ensure It has public keys forwarded to remote systems for secure login

Which of the following steps should the analyst perform to meet these requirements? (Select TWO).
A . Forward the keys using ssh-copy-id.
B . Forward the keys using scp.
C . Forward the keys using ash -i.
D . Forward the keys using openssl -s.
E . Forward the keys using ssh-keyger.

Answer: A,D

Latest SY0-601 Dumps Valid Version with 396 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments