A systems administrator wants to disable the use of usernames and passwords for SSH authentication and enforce key-based authentication.
Which of the following should the administrator do NEXT to enforce this new configuration?
A . Issue a public/private keypair for each user and securely distribute a private key to each employee
B . Instruct users on how to create a public/private keypair and install users’ public keys on the
server
C . Disable the username and password authentication and enable TOTP in the sshd.conf file.
D . Change the default SSH port. enable TCP tunneling. and provide a pre-configured SSH client
Answer: D
Latest SY0-501 Dumps Valid Version with 1130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund