What is a secure configuration option for remote access to a network device?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:March 27, 2023
  • Reading time:2 mins read

What is a secure configuration option for remote access to a network device?

  • Configure SSH.
  • Configure 802.1x.
  • Configure an ACL and apply it to the VTY lines.
  • Configure Telnet.
  • Answers Explanation & Hints:

    A secure configuration option for remote access to a network device is to configure SSH (Secure Shell).

    SSH is a secure protocol for remote access to network devices that provides confidentiality, integrity, and authentication. SSH encrypts all data transmitted between the client and server, preventing eavesdropping and unauthorized access to sensitive information. SSH also uses public key cryptography for user authentication, ensuring that only authorized users can access the device.

    On the other hand, Telnet is an insecure protocol that transmits data in plain text, allowing attackers to intercept and read sensitive information. Configuring 802.1x can enhance network security by enforcing port-based access control, but it is not specifically designed for remote access to network devices. Configuring an ACL and applying it to the VTY lines can help restrict access to authorized users, but it does not provide encryption or user authentication, making it less secure than SSH.

For More Questions and Answers Click the link below:

CCNA 2 SRWE – Switching, Routing, and Wireless Essentials (Version 7.00) – SRWE Final Exam Answers Full 100% v7 & v7.02 2023

5 1 vote
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments