23.1k views
4 votes
In a secure environment, what is used to access a Cisco 2960 switch during initial configuration?

a) Telnet
b) HTTP
c) SSH
d) FTP

User Fogus
by
7.9k points

1 Answer

4 votes

Final answer:

The most secure method to access a Cisco 2960 switch during initial configuration in a secure environment is through SSH, which provides encryption and security against eavesdropping.

Step-by-step explanation:

When configuring a Cisco 2960 switch in a secure environment, the most secure method for accessing the switch during initial configuration would be via Secure Shell (SSH). SSH is an encrypted network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers. Unlike Telnet, which sends traffic in plaintext, SSH provides security against eavesdropping and is the recommended choice when security is a concern. HTTP and FTP also transmit data in plaintext unless configured to use encryption (HTTPS or FTPS), but these protocols are not typically used for initial switch configuration.

User Anders Martini
by
9.0k points