Last Updated on August 14, 2021 by Admin 1
In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms.
Which of the following files should be edited to accomplish this?
- /etc/ssh/sshd_config
- /etc/ssh/ssh_config
- ~/.ssh/ssh_config
- /etc/ssh/known_hosts