Which two different configuration can you apply to a device to block incoming SSH access?
(Choose two)
A. A
B. B
C. C
D. D
E. E
Which two different configuration can you apply to a device to block incoming SSH access?
(Choose two)
A. A
B. B
C. C
D. D
E. E