Which two different configuration can you apply to a device to block incoming SSH access?

Which two different configuration can you apply to a device to block incoming SSH access?
(Choose two)


A. A
B. B
C. C
D. D
E. E

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.