Which of the following is a recommended practice to secure network devices from unauthorized access?

Prepare for the CompTIA A+ Core 2 Exam with flashcards and multiple choice questions complete with hints and explanations. Ace your certification!

Implementing SSH (Secure Shell) for secure connections is a recommended practice to secure network devices from unauthorized access due to its encryption capabilities and security features. SSH provides a secure channel over an unsecured network in a client-server architecture, allowing users to log in to another computer over a network securely. Unlike Telnet, which transmits data in plain text and is vulnerable to interception and eavesdropping, SSH encrypts all data, making it significantly more difficult for attackers to access sensitive information during transmission, including usernames and passwords.

Using SSH also offers additional features such as public key authentication, which strengthens access controls and helps ensure that only authorized users can access network devices. This practice is crucial for maintaining the security integrity of network environments, particularly in scenarios where sensitive data is handled or where devices are exposed to potential threats.

The other options do not promote secure access. For instance, Telnet lacks encryption and poses a high risk for sensitive data exposure. Ensuring all passwords are identical undermines the principle of maintaining unique passwords for different accounts, which is a foundational aspect of security best practices. Keeping firmware outdated can leave devices vulnerable to known exploits that could be mitigated with regular updates. Each of these alternatives fails to enhance the security of network devices as effectively

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy