Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Linux Foundation Exam LFCA Topic 1 Question 28 Discussion

Actual exam question for Linux Foundation's LFCA exam
Question #: 28
Topic #: 1
[All LFCA Questions]

Which of the following is considered a best practice for hardening SSHD?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Romana
3 months ago
Haha, renaming root to a random name? That's definitely not a best practice. I'll go with option C as well.
upvoted 0 times
...
Louis
3 months ago
Hmm, I'm not sure about option A. Portknocking seems a bit outdated and unnecessary if you can just disable root SSH access.
upvoted 0 times
Zena
2 months ago
Completely disabling SSH access seems a bit extreme, don't you think?
upvoted 0 times
...
Tawanna
2 months ago
Portknocking might be overkill if you can just disable root SSH access.
upvoted 0 times
...
Wade
2 months ago
I think renaming root to a random name could also be effective.
upvoted 0 times
...
Elden
2 months ago
I agree, disabling root SSH access is a good security measure.
upvoted 0 times
...
...
Zack
3 months ago
I agree with Lorean. Option C is the way to go. Completely disabling SSH is a bit extreme, and renaming root is just silly.
upvoted 0 times
...
Lorean
3 months ago
Option C looks like the best choice here. Disabling SSH access for root is a common security practice to prevent unauthorized access.
upvoted 0 times
Frank
2 months ago
Renaming root to a random name can also help enhance security.
upvoted 0 times
...
Beatriz
2 months ago
I think using portknocking to protect ssh access for root is also a good option.
upvoted 0 times
...
Sylvie
3 months ago
I agree, disabling SSH access for root is a good security measure.
upvoted 0 times
...
...
Ricarda
4 months ago
I think D) Renaming root to a random name could also be a good practice to prevent unauthorized access.
upvoted 0 times
...
Vilma
4 months ago
I agree with Becky, it's important to limit access for root to enhance security.
upvoted 0 times
...
Becky
4 months ago
I think the best practice is C) Disabling ssh access for root.
upvoted 0 times
...

Save Cancel