A technician wants to securely collect network device configurations and statistics through a
scheduled and automated process. Which of the following should be implemented if configuration
integrity is most important and a credential compromise should not allow interactive logons?
 
A.
 SNMPv3
B.
 TFTP
C.
 SSH
D.
 TLS
 			
			
 
                