Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Linux Foundation Exam LFCA Topic 1 Question 28 Discussion

Actual exam question for Linux Foundation's LFCA exam
Question #: 28
Topic #: 1
[All LFCA Questions]

Which of the following is considered a best practice for hardening SSHD?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Romana
2 months ago
Haha, renaming root to a random name? That's definitely not a best practice. I'll go with option C as well.
upvoted 0 times
...
Louis
2 months ago
Hmm, I'm not sure about option A. Portknocking seems a bit outdated and unnecessary if you can just disable root SSH access.
upvoted 0 times
Zena
11 days ago
Completely disabling SSH access seems a bit extreme, don't you think?
upvoted 0 times
...
Tawanna
26 days ago
Portknocking might be overkill if you can just disable root SSH access.
upvoted 0 times
...
Wade
28 days ago
I think renaming root to a random name could also be effective.
upvoted 0 times
...
Elden
1 months ago
I agree, disabling root SSH access is a good security measure.
upvoted 0 times
...
...
Zack
2 months ago
I agree with Lorean. Option C is the way to go. Completely disabling SSH is a bit extreme, and renaming root is just silly.
upvoted 0 times
...
Lorean
2 months ago
Option C looks like the best choice here. Disabling SSH access for root is a common security practice to prevent unauthorized access.
upvoted 0 times
Frank
24 days ago
Renaming root to a random name can also help enhance security.
upvoted 0 times
...
Beatriz
30 days ago
I think using portknocking to protect ssh access for root is also a good option.
upvoted 0 times
...
Sylvie
1 months ago
I agree, disabling SSH access for root is a good security measure.
upvoted 0 times
...
...
Ricarda
3 months ago
I think D) Renaming root to a random name could also be a good practice to prevent unauthorized access.
upvoted 0 times
...
Vilma
3 months ago
I agree with Becky, it's important to limit access for root to enhance security.
upvoted 0 times
...
Becky
3 months ago
I think the best practice is C) Disabling ssh access for root.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77