If a network architect is planning a secure device management policy, why would administrators
need to generate SSH keys on network infrastructure devices?

A.
To authenticate managers with a more secure method than passwords
B.
To encrypt management traffic and also authenticate managers with asymmetric
C.
To authenticate managers and assign them privileges according to their identity
D.
To encrypt management traffic related to the CLI
To encrypt management traffic related to the CLI
from study guide
0
0
sorry
A.
To authenticate managers with a more secure method than passwords
is the right one
0
0
D is correct.
SSH encrypts the traffic, does not authenticate. Authentication is done over the SSH encrypted link.
0
0