• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

When configuring SSH on a router to implement secure network management, a network engineer has issued the login local and transport input ssh line vty commands. What three additional configuration actions have to be performed to complete the SSH configuration? (Choose three.)

  • Set the user privilege levels.
  • Generate the asymmetric RSA keys.
  • Configure the correct IP domain name.
  • Configure role-based CLI access.
  • Create a valid local username and password database.
  • Manually enable SSH after the RSA keys are generated.

Answers Explanation & Hints:

SSH is automatically enabled after the RSA keys are generated. Setting user privilege levels and configuring role-based CLI access are good security practices but are not a requirement of implementing SSH.

For more Questions and Answers:

CCNA 1 v7 – ITN v7.02 – Modules 16 – 17: Building and Securing a Small Network Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments