Which of the following is NOT a security recommendation when implementing SSH?
A. Change the port number in use from the default of 23.
B. Only use version 2.
C Disable root login to devices that have a root account.
D. Control access to any SSH enabled device using ACLs, iptables, or TCP wrappers.
A
Explanation: You should change the port number, but the default is not 23 It's 22.
You might also like to view...
The number of degrees that an arc traverses from its starting angle is known as the _____________.
a) traversed angle b) size c) arc angle d) None of the above.
A(n) ____________ event occurs on a control when the user clicks the mouse on a control while the program is running.
a. Action b. Click c. Live d. Mouse
The Internet name for the group of computers known collectively as the DNS root is ____________.
Fill in the blank(s) with the appropriate word(s).
There is a strong movement toward using the term Internet Protocol instead of the term TCP/IP.
Answer the following statement true (T) or false (F)