A vulnerability assessment highlighted that remote access to the switches is permitted using unsecure and unencrypted protocols. Which configuration must be applied to allow only secure and reliable remote access for device administration?
A.
line vty 0 15 login local transport input all
B.
line vty 0 15 login local transport input ssh
C.
line vty 0 15 login local transport input telnet ssh
This section is not available anymore. Please use the main Exam Page.350-401 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
[Removed]
6 months, 3 weeks agoeddgg
1 year, 4 months agobora4motion
2 years agoDataset
1 year, 8 months agoIvAlAx
1 year, 8 months ago