350-501 Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)

An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol.
Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)

Refer to the exhibit. An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol.
Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)

  • A. Configure an IP domain name.
  • B. Configure service password encryption.
  • C. Configure crypto keys
  • D. Configure ACL 100 to permit access to port 22.
  • E. Configure a password under the vty lines.
Answer: Option A, C.
Explanation: 

No answer description available for this question

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
error: Alert: Content is protected !!

Adblock Detected

Please consider supporting us by disabling your ad blocker