If a network architect is planning a secure device management policy, why would administrators need to generate SSH keys on network infrastructure devices?

If a network architect is planning a secure device management policy, why would administrators need to generate SSH keys on network infrastructure devices?
A . To authenticate managers with a more secure method than passwords
B . To encrypt management traffic and also authenticate managers with asymmetric
C . To authenticate managers and assign them privileges according to their identity
D . To encrypt management traffic related to the CLI

Answer: D

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments