When configuring SSH on a router to implement secure network management, a network engineer has issued the login local and transport input ssh line vty commands. What three additional configuration actions have to be performed to complete the SSH configuration? (Choose three.)

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:April 27, 2023
  • Reading time:2 mins read

When configuring SSH on a router to implement secure network management, a network engineer has issued the login local and transport input ssh line vty commands. What three additional configuration actions have to be performed to complete the SSH configuration? (Choose three.)

  • Set the user privilege levels.
  • Generate the asymmetric RSA keys.
  • Configure the correct IP domain name.
  • Configure role-based CLI access.
  • Create a valid local username and password database.
  • Manually enable SSH after the RSA keys are generated.
    Answers Explanation & Hints:

    SSH is automatically enabled after the RSA keys are generated. Setting user privilege levels and configuring role-based CLI access are good security practices but are not a requirement of implementing SSH.

For more Questions and Answers click the link below:

CCNA 1 v7 & v7.02 – ITN v7 – Modules 16 – 17: Building and Securing a Small Network Exam Answers 2023 Full 100%

5 1 vote
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments