Which of the following will prevent non-root SSH access to a Linux server?
A junior systems administrator has just generated public and private authentication keys for passwordless login. Which of the following files will be moved to the remote servers?
While inspecting a recently compromised Linux system, the administrator identified a number of processes that should not have been running:
Which of the following commands should the administrator use to terminate all of the identified processes?
An administrator thinks that a package was installed using a snap. Which of the following commands can the administrator use to verify this information?