CompTIA Exam Questions

Which of the following should be implemented if configuration integrity is most important and a cred

A technician wants to securely collect network device configurations and statistics through a
scheduled and automated process. Which of the following should be implemented if configuration
integrity is most important and a credential compromise should not allow interactive logons?

A.
SNMPv3

B.
TFTP

C.
SSH

D.
TLS