Question:
When configuring SSH on a router to implement secure network management, a network engineer has issued the login local and transport input ssh line vty commands. What three additional configuration actions have to be performed to complete the SSH configuration? (Choose three.)
- Set the user privilege levels.
- Generate the asymmetric RSA keys.
- Configure the correct IP domain name.
- Configure role-based CLI access.
- Create a valid local username and password database.
- Manually enable SSH after the RSA keys are generated.
Explanation: SSH is automatically enabled after the RSA keys are generated. Setting user privilege levels and configuring role-based CLI access are good security practices but are not a requirement of implementing SSH.
Exam with this question: CCNA 1 v7 Checkpoint Exam: Building and Securing a Small Network Exam Answers
Exam with this question: CCNP ENARSI 8 Modules 21 - 23 Checkpoint Exam: Infrastructure Security and Management Exam
Exam with this question: CCNA Security Practice Final Exam Answers
Exam with this question: CCNA Security Certification Practice Exam Answers
Exam with this question: Networking Essentials: Course Final Exam
Exam with this question: Networking Essentials 2.0 Practice Final Exam Answers
Exam with this question: Networking Essentials 3.0 Checkpoint Exam: Configure Cisco Devices
Please login or Register to submit your answer