Which of the following protocols can be used to change device configurations via encrypted and authenticated
sessions? (Choose two.)
A. SNMPv3
B. SSH
C. Telnet
D. IPSec
E. ESP
F. Syslog
sessions? (Choose two.)
A. SNMPv3
B. SSH
C. Telnet
D. IPSec
E. ESP
F. Syslog