What is a key disadvantage of using SSH keys?

Prepare for the CyberArk PAS Administration Test. Use flashcards and multiple choice questions with explanations to boost your scores. Ensure success on your certification exam!

Using SSH keys comes with several advantages, but they also have notable drawbacks. One significant disadvantage is the security risk associated with a compromised system allowing lateral movement to other systems via private keys.

When a system is compromised and the attacker gains access to SSH private keys, they can potentially use these keys to access other systems that trust those keys without needing to enter any passwords. This is especially critical in environments where SSH keys are used for automation or where multiple systems share access via the same key. Thus, if a private key is not properly secured, it can lead to a broader compromise of the network or system infrastructure.

Other options do not represent disadvantages of SSH keys. The ability to change them easily is in fact an advantage for maintaining good security hygiene, technical knowledge is typically required for implementing and managing SSH keys effectively, and SSH keys are generally considered more secure compared to traditional passwords because they eliminate risks such as weak passwords and are less susceptible to brute-force attacks. This makes the third option the true disadvantage that highlights the importance of securing SSH keys and understanding their implications in a compromised scenario.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy