Using key-based authentication instead of passwords is a best practice for securing remote administration sessions because it provides stronger security than password-based authentication. This method relies on cryptographic keys, which are significantly more resistant to brute-force attacks than passwords. While the other options are valid security measures, they are not the BEST method for securing the session's authentication process. Disabling unused services on the server reduces the overall attack surface but does not directly secure the authentication of the management session. Configuring a network firewall to restrict incoming traffic is a critical network-level control that limits who can attempt to connect, but it does not enhance the security of the authentication process itself. Similarly, disabling root logins is an important hardening step to prevent direct attacks on the most privileged account, but it does not strengthen the authentication method used by other administrative accounts.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is key-based authentication?
Open an interactive chat with Bash
Why are passwords considered less secure than key-based authentication?
Open an interactive chat with Bash
What does disabling root logins accomplish in server security?