Security Policies for SSH Server - XK0-004 Exam - CompTIA Linux+

Preventing Insecure Algorithms for SSH Server

Question

In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms.

Which of the following files should be edited to accomplish this?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

The correct answer is A. /etc/ssh/sshd_config.

SSH (Secure Shell) is a protocol used to securely connect to a remote server or device. SSH uses a combination of cryptographic techniques to provide confidentiality, integrity, and authentication. However, some of the cryptographic algorithms used by SSH can be vulnerable to attacks.

To comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms. The configuration file that controls the behavior of the SSH server is /etc/ssh/sshd_config. This file contains various settings for the SSH server, including the allowed cryptographic algorithms.

To prevent the SSH server from using insecure algorithms, the administrator needs to edit the /etc/ssh/sshd_config file and remove any insecure algorithms from the list of allowed algorithms. The list of allowed algorithms can be found in the "Ciphers" and "MACs" sections of the file.

It is important to note that the /etc/ssh/ssh_config file (option B) is used to configure the behavior of the SSH client, not the server. The ~/.ssh/ssh_config file (option C) is a per-user configuration file for the SSH client. The /etc/ssh/known_hosts file (option D) contains a list of known host keys for remote servers and is not used for configuring the SSH server.