Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

IT Questions BankCategory: CCNAWhich protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

Question:
Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

  • SNMP
  • TFTP
  • SSH
  • SCP

Explanation: Telnet uses plain text to communicate in a network. The username and password can be captured if the data transmission is intercepted. SSH encrypts data communications between two network devices. TFTP and SCP are used for file transfer over the network. SNMP is used in network management solutions.

Exam with this question: Modules 10 – 13: L2 Security and WLANs Exam Answers
Exam with this question: Checkpoint Exam: Layer 2 and Endpoint Security Group Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments