List of questions
Related questions
Question 301 - 350-401 discussion
A vulnerability assessment highlighted that remote access to the switches is permitted using unsecure and unencrypted protocols Which configuration must be applied to allow only secure and reliable remote access for device administration?
A.
line vty 0 15 login local transport input none
B.
line vty 0 15 login local transport input telnet ssh
C.
line vty 0 15 login local transport input ssh
D.
line vty 0 15 login local transport input all
Your answer:
0 comments
Sorted by
Leave a comment first