BlackFriday 2024! Hurry Up, Grab the Special Discount - Save 25%
- Ends In
00:00:00
Coupon code:
SAVE25
X
Welcome to Pass4Success
Login
|
Sign up
-
Free
Preparation Discussions
Mail Us
support@pass4success.com
Location
US
MENU
Home
Popular vendors
Salesforce
Microsoft
Nutanix
Amazon
Google
CompTIA
SAP
VMware
Fortinet
PeopleCert
Eccouncil
HP
Palo Alto Networks
Adobe
ServiceNow
Dell EMC
CheckPoint
Linux Foundation
Discount Deals
New
About
Contact
Login
Sign up
Home
Discussions
Linux Foundation Discussions
Exam LFCA Topic 1 Question 28 Discussion
Linux Foundation Exam LFCA Topic 1 Question 28 Discussion
Actual exam question for Linux Foundation's LFCA exam
Question #: 28
Topic #: 1
[All LFCA Questions]
Which of the following is considered a best practice for hardening SSHD?
A
Using portknocking to protect ssh access for root
B
Completely disabling ssh access
C
Disabling ssh access for root
D
Renaming root to a random name
Show Suggested Answer
Hide Answer
Suggested Answer:
C
by
Stephane
at
Sep 15, 2024, 04:48 PM
Limited Time Offer
25%
Off
Get Premium LFCA Questions as Interactive Web-Based Practice Test or PDF
Contribute your Thoughts:
Submit
Cancel
Romana
12 days ago
Haha, renaming root to a random name? That's definitely not a best practice. I'll go with option C as well.
upvoted
0
times
...
Louis
14 days ago
Hmm, I'm not sure about option A. Portknocking seems a bit outdated and unnecessary if you can just disable root SSH access.
upvoted
0
times
...
Zack
17 days ago
I agree with Lorean. Option C is the way to go. Completely disabling SSH is a bit extreme, and renaming root is just silly.
upvoted
0
times
...
Lorean
19 days ago
Option C looks like the best choice here. Disabling SSH access for root is a common security practice to prevent unauthorized access.
upvoted
0
times
Sylvie
10 days ago
I agree, disabling SSH access for root is a good security measure.
upvoted
0
times
...
...
Ricarda
2 months ago
I think D) Renaming root to a random name could also be a good practice to prevent unauthorized access.
upvoted
0
times
...
Vilma
2 months ago
I agree with Becky, it's important to limit access for root to enhance security.
upvoted
0
times
...
Becky
2 months ago
I think the best practice is C) Disabling ssh access for root.
upvoted
0
times
...
Log in to Pass4Success
×
Sign in:
Forgot my password
Log in
Report Comment
×
Is the comment made by
USERNAME
spam or abusive?
Commenting
×
In order to participate in the comments you need to be logged-in.
You can
sign-up
or
login
Save
Cancel
Romana
12 days agoLouis
14 days agoZack
17 days agoLorean
19 days agoSylvie
10 days agoRicarda
2 months agoVilma
2 months agoBecky
2 months ago