An engineer is configuring remote access to a router from IP subnet 10.139.58.0/28. The domain name, crypto keys, and SSH have been configured. Which configuration enables the traffic on the destination router?

IT Questions BankCategory: CCNAAn engineer is configuring remote access to a router from IP subnet 10.139.58.0/28. The domain name, crypto keys, and SSH have been configured. Which configuration enables the traffic on the destination router?

An engineer is configuring remote access to a router from IP subnet 10.139.58.0/28. The domain name, crypto keys, and SSH have been configured. Which configuration enables the traffic on the destination router?

  • A. Option A
  • B. Option B
  • C. Option C
  • D. Option D

More Questions: CA201


guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x