Valid SY0-601 Dumps shared by ExamDiscuss.com for Helping Passing SY0-601 Exam! ExamDiscuss.com now offer the newest SY0-601 exam dumps, the ExamDiscuss.com SY0-601 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com SY0-601 dumps with Test Engine here:
Access SY0-601 Dumps Premium Version
(1061 Q&As Dumps, 35%OFF Special Discount Code: freecram)
Recent Comments (The most recent comments are at the top.)
To enforce key-based authentication for SSH and disable the use of usernames and passwords, the systems administrator should do the following:
**A. Instruct users on how to create a public/private key pair and install users' public keys on the server.**
This is the correct next step. In this approach, users are responsible for generating their own key pairs, and the public keys are added to the server's authorized keys file. It's a standard and secure way to enforce key-based authentication, and it allows users to manage their own keys, which can be revoked or rotated as needed.
Option B, changing the default SSH port, enabling TCP tunneling, and providing a pre-configured SSH client, is not directly related to enforcing key-based authentication and doesn't address the primary goal of disabling password authentication.
Option C, issuing public/private key pairs for each user and distributing private keys, can be administratively burdensome and may not align with best practices for key management. Users typically generate their own key pairs for security reasons.
Option D, disabling username and password authentication and enabling TOTP (Time-based One-Time Password) in the sshd.conf file, is a different authentication mechanism that doesn't enforce key-based authentication, which is the specific requirement in the question....