Which two actions must the engineer implement to complete the SSH configuration?


Refer to the exhibit. An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH protocol. Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)
A. Configure an IP domain name.
B. Configure ACL 100 to permit access to port 22.
C. Configure a password under the vty lines.
D. Configure crypto keys.
E. Configure service password encryption.

cisco-exams

2 thoughts on “Which two actions must the engineer implement to complete the SSH configuration?

  1. Authentication Test with SSH

    In order to test authentication with SSH, you have to add to the previous statements in order to enable SSH on Carter and test SSH from the PC and UNIX stations.

    ip domain-name rtp.cisco.com

    !— Generate an SSH key to be used with SSH.

    crypto key generate rsa
    ip ssh time-out 60
    ip ssh authentication-retries 2

    At this point, the show crypto key mypubkey rsa command must show the generated key. After you add the SSH configuration, test your ability to access the router from the PC and UNIX station. If this does not work, see the debug section of this document.

  2. i would choose A and D, it says “complete the SSH configuration” no “ACL Configuration” or “permitted networks”

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.