Why would administrators need to generate SSH keys on network infrastructure devices?

If a network architect is planning a secure device management policy, why would administrators need to generate SSH keys on network infrastructure devices?
A. To authenticate managers with a more secure method than passwords
B. To encrypt management traffic and also authenticate managers with asymmetric
C. To authenticate managers and assign them privileges according to their identity
D. To encrypt management traffic related to the CLI

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.