A company is experiencing network access errors within one department that operates in a secure environment. The network administrator needs to investigate the configurations of the switches servicing that department to determine the cause of the network access errors. Which of the following tools should be used to directly access the switches in that department?
A.
AES
B.
RDP
C.
HTTP
D.
SSH
D.