Which of the following is NOT a security recommendation when implementing SSH?
A. Change the port number in use from the default of 23.
B. Only use version 2.
C Disable root login to devices that have a root account.
D. Control access to any SSH enabled device using ACLs, iptables, or TCP wrappers.
A
Explanation: You should change the port number, but the default is not 23 It's 22.
Computer Science & Information Technology
You might also like to view...
A ________ is any disk drive, folder, or other place a user can store files and folders
A) location B) hard drive C) removable storage device D) USB
Computer Science & Information Technology
The stack is empty if stackTop is ____.
A. 0 B. NULL C. 1 D. MAX
Computer Science & Information Technology