Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

Last Updated on April 30, 2021 by Admin

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

  • SCP
  • SSH
  • TFTP
  • SNMP
    Answers Explanation & Hints:

    Telnet uses plain text to communicate in a network. The username and password can be captured if the data transmission is intercepted. SSH encrypts data communications between two network devices. TFTP and SCP are used for file transfer over the network. SNMP is used in network management solutions.

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments