What are two recommended ways of protecting network device configuration files from outside network security threats?

What are two recommended ways of protecting network device configuration files from outside
network security threats? (Choose two.)

What are two recommended ways of protecting network device configuration files from outside
network security threats? (Choose two.)

A.
Allow unrestricted access to the console or VTY ports.

B.
Use a firewall to restrict access from the outside to the network devices.

C.
Always use Telnet to access the device command line because its data is automatically
encrypted.

D.
Use SSH or another encrypted and authenticated transport to access device configurations.

E.
Prevent the loss of passwords by disabling password encryption.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


ish

ish

Secure Shell, or SSH, is a cryptographic (encrypted) network protocol operating at layer 7 of the OSI Model to allow remote login and other network services to operate securely over an unsecured network.[1]
SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server.[2] Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.

The most visible application of the protocol is for access to shell accounts on Unix-like operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.

SSH was designed as a replacement for Telnet and for unsecured remote shell protocols such as the Berkeley rlogin, rsh, and rexec protocols. Those protocols send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis.

The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet

blatt

blatt

Shell is software’s user interface