A technician wants to securely collect network device configurations and statistics through a
scheduled and automated process. Which of the following should be implemented if configuration
integrity is most important and a credential compromise should not allow interactive logons?
A.
SNMPv3
B.
TFTP
C.
SSH
D.
TLS