Notifications
Clear all
Topic starter
16/07/2022 3:55 am
A security analyst Is hardening a Linux workstation and must ensure It has public keys forwarded to remote systems for secure login.
Which of the following steps should the analyst perform to meet these requirements? (Select TWO).
- A . Forward the keys using ssh-copy-id.
- B . Forward the keys using scp.
- C . Forward the keys using ash -i.
- D . Forward the keys using openssl -s.
- E . Forward the keys using ssh-keyger.
Suggested Answer: A,D