Which of the following is NOT a security recommendation when implementing SSH?

A. Change the port number in use from the default of 23.
B. Only use version 2.
C Disable root login to devices that have a root account.
D. Control access to any SSH enabled device using ACLs, iptables, or TCP wrappers.


A
Explanation: You should change the port number, but the default is not 23 It's 22.

Computer Science & Information Technology

You might also like to view...

The number of degrees that an arc traverses from its starting angle is known as the _____________.

a) traversed angle b) size c) arc angle d) None of the above.

Computer Science & Information Technology

A(n) ____________ event occurs on a control when the user clicks the mouse on a control while the program is running.

a. Action b. Click c. Live d. Mouse

Computer Science & Information Technology

The Internet name for the group of computers known collectively as the DNS root is ____________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

There is a strong movement toward using the term Internet Protocol instead of the term TCP/IP.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology