Question: Allowing only private key-based logins to the remote command line has various advantages: (Choose all that apply) Question 8 options: By using passphrase-protected private keys
Allowing only private key-based logins to the remote command line has various advantages: (Choose all that apply)
Question 8 options:
|
|
By using passphrase-protected private keys in conjunction with ssh-agent, the passphrase is exposed less frequently since it is entered less frequently, and logging in is more convenient for the user.
|
|
|
Attackers cannot use password guessing attacks to remotely break into known accounts on the system.
|
|
|
With passphrase-protected private keys, an attacker needs both the passphrase and a copy of the private key. With passwords, an attacker just needs the password.
|
|
|
None of these are correct
|
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
