A network technician is performing an initial configuration of a new network switch.
Per company policy, the only authorized manner for remotely administering the switch is through a command line.
Which of the following protocols should the technician disable to adhere to the company policy?
A.
HTTP B.
Telnet C.
SSH D.
TFTP.
A.
A network technician is performing an initial configuration of a new network switch.
Per company policy, the only authorized manner for remotely administering the switch is through a command line.
Which of the following protocols should the technician disable to adhere to the company policy?
A.
B.
Telnet
C.
SSH
D.
TFTP.
A.
The protocol that the technician should disable to adhere to the company policy is Telnet (option B).
Telnet is a protocol that enables remote access to network devices such as switches, routers, and servers. It uses unencrypted communication, meaning that the data sent over Telnet can be easily intercepted and read by anyone with access to the network. Therefore, it poses a security risk and is not considered a secure method for remote administration.
In contrast, SSH (option C) is a secure protocol that provides encrypted communication between the remote device and the network device. It uses public-key cryptography to authenticate the connection and encrypt the data being transmitted, making it a much more secure method for remote administration than Telnet.
HTTP (option A) is a protocol used for web browsing, and it is not typically used for remote administration of network devices. TFTP (option D) is a protocol used for file transfers and is not directly related to remote administration of network devices.
In summary, to adhere to the company policy of only allowing remote administration through a command line, the technician should disable Telnet and enable SSH as the preferred protocol for remote access.