A recent vulnerability scan found that Telnet is enabled on all network devices. Which of the
following protocols should be used instead of Telnet?

A.
SCP
B.
SSH
C.
SFTP
D.
SSL
Explanation:
SSH transmits both authentication traffic and data in a secured encrypted form, whereas Telnet
transmits both authentication credentials and data in clear text.