Which of the following should be implemented if configuration integrity is most important and a credential compromise should not allow interactive logons?

A technician wants to securely collect network device configurations and statistics through a
scheduled and automated process. Which of the following should be implemented if configuration
integrity is most important and a credential compromise should not allow interactive logons?

A technician wants to securely collect network device configurations and statistics through a
scheduled and automated process. Which of the following should be implemented if configuration
integrity is most important and a credential compromise should not allow interactive logons?

A.
SNMPv3

B.
TFTP

C.
SSH

D.
TLS



Leave a Reply 0

Your email address will not be published. Required fields are marked *

two + one =