In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms.
Which of the following files should be edited to accomplish this?
A . /etc/ssh/sshd_config
B . /etc/ssh/ssh_config
C . ~/.ssh/ssh_config
D . /etc/ssh/known_hosts
Answer: A
Latest XK0-004 Dumps Valid Version with 267 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund