Notifications
Clear all
Topic starter
In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms.
Which of the following files should be edited to accomplish this?
- A . /etc/ssh/sshd_config
B. /etc/ssh/ssh_config
C. ~/.ssh/ssh_config
D. /etc/ssh/known_hosts
Suggested Answer: A
Posted : 16/12/2022 3:25 am