Which of the follow...
 
Notifications
Clear all

Which of the following steps should the analyst perform to meet these requirements?

1 Posts
1 Users
0 Likes
408 Views
(@palomamikel)
Noble Member
Joined: 2 years ago
Posts: 733
Topic starter  

A security analyst Is hardening a Linux workstation and must ensure It has public keys forwarded to remote systems for secure login.

Which of the following steps should the analyst perform to meet these requirements? (Select TWO).

  • A . Forward the keys using ssh-copy-id.
  • B . Forward the keys using scp.
  • C . Forward the keys using ash -i.
  • D . Forward the keys using openssl -s.
  • E . Forward the keys using ssh-keyger.

Show Answer Hide Answer

Suggested Answer: A,D

   
Quote

Latest CompTIA SY0-601 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: