Skip to Content
Mastering Linux Security and Hardening - Second Edition
book

Mastering Linux Security and Hardening - Second Edition

by Donald A. Tevault
February 2020
Intermediate to advanced
666 pages
15h 45m
English
Packt Publishing
Content preview from Mastering Linux Security and Hardening - Second Edition

Questions

  1. Which of the following is a true statement?

A) Secure Shell is completely secure in its default configuration. B) It's safe to allow the root user to use Secure Shell to log in across the internet. C) Secure Shell is insecure in its default configuration. D) The most secure way to use Secure Shell is to log in with a username and password.

  1. Which three of the following things would you do to conform with the best security practices for Secure Shell?

A) Make sure that all users are using strong passwords to log in via Secure Shell. B) Have all users create a public/private key pair, and transfer their public keys to the server to which they want to log in. C) Disable the ability to log in via username/password. D) Ensure that ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Mastering Linux Security and Hardening - Third Edition

Mastering Linux Security and Hardening - Third Edition

Donald A. Tevault
UNIX and Linux System Administration Handbook, 5th Edition

UNIX and Linux System Administration Handbook, 5th Edition

Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin

Publisher Resources

ISBN: 9781838981778Supplemental Content