Which is the preferred method for securing device terminal lines?
- a password configured directly on the terminal lines
- username-based authentication
- AAA authentication
- username-based authentication restricted with an ACL
Explanation: The preferred method for securing device terminal lines is to use an AAA server. Username-based authentication is recommended as a backup. Configuring a password directly on the line is not recommended.