In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms.

Last Updated on August 14, 2021 by Admin 1

In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms.

Which of the following files should be edited to accomplish this?

  • /etc/ssh/sshd_config
  • /etc/ssh/ssh_config
  • ~/.ssh/ssh_config
  • /etc/ssh/known_hosts

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments