Last Updated on August 7, 2021 by Admin 2
A technician logs onto a system using Telnet because SSH is unavailable. SSH is enabled on the target device, and access is allowed from all subnets. The technician discovers a critical step was missed. Which of the following would allow SSH to function properly?
- Perform file hashing
- Generate new keys
- Update firmware
- Change default credentials