A recent vulnerability scan found that Telnet is enabled on all network devices. Which of the following protocols
should be used instead of Telnet?

A.
SCP
B.
SSH
C.
SFTP
D.
SSL
Explanation:
SSH transmits both authentication traffic and data in a secured encrypted form, whereas Telnet transmits both
authentication credentials and data in clear text.