Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

Last Updated on October 29, 2020 by Admin

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

  • SCP
  • SSH
  • TFTP
  • SNMP
    Answers Explanation & Hints:

    Telnet uses plain text to communicate in a network. The username and password can be captured if the data transmission is intercepted. SSH encrypts data communications between two network devices. TFTP and SCP are used for file transfer over the network. SNMP is used in network management solutions.

For more question and answers:

Click Here CCNA 2 SRWE v7 – Modules 10 – 13 – L2 Security and WLANs Exam Answers Full 100%

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments