Which of the following should be implemented to secure Pete's, a network administrator, day-today maintenance activities?

A. TFTP
B. Telnet
C. TACACS
D. FTP
E. SSH

Answer:
C. TACACS
E. SSH

Computer Science & Information Technology

You might also like to view...

An engineer is performing the IP subnet design for an organization and needs to find the best mask that should be used. The organization has been assigned the 172.52.239.0/24 network. The addresses must be split up so that they can be equally organized into 10 subnets of at least 32 addresses. Which mask would best fit this requirement?

A) 255.255.255.240 B) 255.255.255.224 C) 255.255.255.248 D) None

Computer Science & Information Technology

A self edge is also called a ______.

a) cycle b) loop c) circuit d) multigraph

Computer Science & Information Technology