hardmultiple choiceObjective-mapped

An engineer wants remote administrative access to remain available but also wants session contents protected in transit. Which management choice best supports that goal?

Question 1hardmultiple choice
Full question →

An engineer wants remote administrative access to remain available but also wants session contents protected in transit. Which management choice best supports that goal?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

SSH

This is correct because SSH supports encrypted remote administration.

B

Distractor review

Telnet

This is wrong because Telnet sends traffic in clear text.

C

Distractor review

Open wireless access

This is wrong because WLAN openness is unrelated to secure device administration.

D

Distractor review

Native VLAN 1

This is wrong because native VLAN choice is unrelated to encrypted management access.

Common exam trap

Common exam trap: answer the scenario, not the keyword

A common exam trap is selecting Telnet because it allows remote access, ignoring that it transmits data in clear text. This mistake overlooks the critical security requirement to protect session contents during transit. Another trap is choosing options unrelated to encryption, such as native VLAN or open wireless access, which do not address secure remote management. Candidates must focus on protocols that provide confidentiality and integrity for administrative sessions, not just connectivity.

Technical deep dive

How to think about this question

Secure remote administration is essential for protecting network devices from unauthorized access and data interception. SSH (Secure Shell) is a protocol that encrypts all data exchanged between the administrator and the device, including credentials and command output. This encryption prevents attackers from capturing sensitive information during transmission, which is a fundamental security principle in network management. Cisco devices support SSH as the preferred method for secure remote access, replacing older protocols like Telnet. The decision to use SSH over Telnet is based on the need to protect management-plane traffic. Telnet sends all data in plaintext, making it vulnerable to sniffing and man-in-the-middle attacks. SSH uses cryptographic techniques to authenticate both ends of the connection and encrypt the session, ensuring confidentiality and integrity. In Cisco IOS, enabling SSH involves generating cryptographic keys and configuring user authentication, which aligns with security best practices tested in the CCNA exam. Exam candidates often confuse unrelated concepts such as VLAN configurations or wireless access settings with secure management. While native VLANs and wireless security are important in their contexts, they do not encrypt remote administrative sessions. The practical takeaway is that SSH is the only option among the given choices that directly addresses the requirement for encrypted remote access, making it the correct and secure choice for managing Cisco devices remotely.

KKey Concepts to Remember

  • SSH provides encrypted remote administrative access, protecting session data and credentials from interception during transit.
  • Telnet sends management traffic in clear text, making it vulnerable to eavesdropping and credential theft on the network.
  • Remote device management requires secure protocols to maintain confidentiality and integrity of administrative sessions.
  • Native VLAN configuration does not influence encryption or security of remote management protocols like SSH or Telnet.
  • Open wireless access points do not secure management sessions and can expose administrative traffic to unauthorized users.
  • Cisco devices prefer SSH over Telnet for remote management when security is a priority, aligning with best practices.
  • Encrypted management protocols like SSH prevent man-in-the-middle attacks by authenticating both client and server.
  • Using SSH supports compliance with security fundamentals by ensuring remote administration does not expose sensitive data.

TExam Day Tips

  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related 200-301 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this 200-301 question test?

SSH provides encrypted remote administrative access, protecting session data and credentials from interception during transit.

What is the correct answer to this question?

The correct answer is: SSH — The best choice is SSH because it provides encrypted remote administrative access. In plain language, the engineer wants administrators to keep managing devices remotely, but without exposing credentials or session contents in clear text. SSH solves that by protecting the traffic in transit, which is why it is preferred over older plaintext protocols such as Telnet. This is a core management-plane security principle. The goal is not to remove remote administration, but to perform it safely. The correct answer is the one that aligns with secure remote access rather than convenience at the expense of protection.

What should I do if I get this 200-301 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.