Which of the following is NOT a security recommendation when implementing SSH?

A. Change the port number in use from the default of 23.
B. Only use version 2.
C Disable root login to devices that have a root account.
D. Control access to any SSH enabled device using ACLs, iptables, or TCP wrappers.

A
Explanation: You should change the port number, but the default is not 23 It's 22.

Computer Science & Information Technology

You might also like to view...

A ________ is any disk drive, folder, or other place a user can store files and folders

A) location B) hard drive C) removable storage device D) USB

Computer Science & Information Technology

The stack is empty if stackTop is ____.

A. 0 B. NULL C. 1 D. MAX

Computer Science & Information Technology