Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 100-490 Topic 3 Question 51 Discussion

Actual exam question for Cisco's 100-490 exam
Question #: 51
Topic #: 3
[All 100-490 Questions]

What are two ways Telnet and SSH function? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: A, E

* A. SSH...secure remote access: This is correct. SSH (Secure Shell) is designed specifically for secure remote access. It utilizes strong encryption to protect data transmissions, including login credentials and commands.

* B. Telnet...secure remote access: This is incorrect. Telnet is inherently insecure as it transmits all data, including sensitive passwords, in cleartext.

* C. SSH uses...TCP port 23: This is incorrect. SSH uses TCP port 22 by default, while Telnet uses TCP port 23.

* D. Telnet preferred...security reasons: This is incorrect. SSH is vastly preferred over Telnet due to its strong security features.

* E. Telnet connection...router reboots: This is correct. Telnet connections are not persistent, so a router reboot disrupts them. This re-enforces their lack of suitability for critical management tasks.

Key Points:

* Security: SSH is the recommended protocol for remote access to network devices due to its strong encryption and authentication mechanisms.

* Persistence: Telnet connections are temporary and get disrupted on events like router reboots.


Contribute your Thoughts:

Amber
2 months ago
Hmm, I'm not sure if Telnet is preferred over SSH for security reasons. That's like saying MySpace is better than Facebook for privacy.
upvoted 0 times
Maile
1 months ago
C) SSH uses the well-known TCP port 23 for its communication.
upvoted 0 times
...
Maile
1 months ago
A) SSH is a protocol that provides a secure remote access connection to network devices.
upvoted 0 times
...
...
Kathrine
2 months ago
Wait, Telnet uses port 23? I thought that was just an urban legend! Good thing I double-checked the options.
upvoted 0 times
...
Sena
2 months ago
I'm pretty sure option E is correct. Telnet connections can't withstand a router reboot, unlike SSH which is more reliable.
upvoted 0 times
Tresa
29 days ago
A) SSH is a protocol that provides a secure remote access connection to network devices.
upvoted 0 times
...
Felicitas
1 months ago
E) A Telnet network management connection is dropped when a router reboots.
upvoted 0 times
...
Shanda
1 months ago
A) SSH is a protocol that provides a secure remote access connection to network devices.
upvoted 0 times
...
...
Kerry
2 months ago
I agree with Leslee. SSH is the way to go for secure remote access. Telnet is outdated and insecure.
upvoted 0 times
Candida
1 months ago
E) A Telnet network management connection is dropped when a router reboots.
upvoted 0 times
...
Carma
1 months ago
C) SSH uses the well-known TCP port 23 for its communication.
upvoted 0 times
...
Karon
2 months ago
A) SSH is a protocol that provides a secure remote access connection to network devices.
upvoted 0 times
...
...
Cathrine
3 months ago
I'm not sure about D, I think Telnet is less secure than SSH.
upvoted 0 times
...
Miss
3 months ago
I agree with A, but I also think C is correct because SSH uses port 23.
upvoted 0 times
...
Leslee
3 months ago
A and B are the correct options. SSH is secure while Telnet is not, so option D is just plain wrong.
upvoted 0 times
Raul
2 months ago
C) SSH uses the well-known TCP port 23 for its communication.
upvoted 0 times
...
Bonita
2 months ago
E) A Telnet network management connection is dropped when a router reboots.
upvoted 0 times
...
Velda
2 months ago
A) SSH is a protocol that provides a secure remote access connection to network devices.
upvoted 0 times
...
...
Aaron
3 months ago
I think A is correct because SSH is secure.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77