Which two statements accurately describe why SSH is preferred over Telnet for device administration?
Answer choices
Why each option matters
Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.
Best answer
SSH is generally considered the more secure choice for remote CLI administration.
This is correct because SSH is the preferred secure remote-management option.
Best answer
Telnet is generally considered less secure for remote device administration.
This is correct because Telnet is commonly treated as the weaker legacy option.
Distractor review
SSH eliminates the need for authentication and authorization policy.
This is wrong because secure transport does not replace access-control design.
Distractor review
Telnet is required before SSH can operate.
This is wrong because Telnet is not a prerequisite for SSH.
Distractor review
SSH is used only on wireless controllers and nowhere else.
This is wrong because SSH is broadly used across many kinds of devices.
Common exam trap
Common exam trap: answer the scenario, not the keyword
A common exam trap is believing that SSH removes the need for authentication and authorization policies. While SSH secures the communication channel by encrypting data, it does not replace access control mechanisms that restrict who can log into a device. Another frequent mistake is thinking Telnet must be enabled before SSH can function, which is incorrect because SSH operates independently. Additionally, some candidates incorrectly assume SSH is only used on wireless controllers, ignoring its widespread use on routers and switches. Recognizing these misconceptions is crucial to correctly answering questions about secure device administration protocols.
Technical deep dive
How to think about this question
Secure Shell (SSH) is a cryptographic network protocol that provides secure remote command-line interface (CLI) access to network devices, including Cisco routers and switches. It encrypts all transmitted data, including authentication credentials and session information, protecting against eavesdropping, interception, and man-in-the-middle attacks. In contrast, Telnet transmits data in plaintext, exposing sensitive information to potential attackers on the network. SSH uses public-key cryptography for authentication and establishes an encrypted tunnel, making it the preferred method for secure device administration in Cisco environments. When choosing between SSH and Telnet for device management, Cisco recommends SSH due to its robust security features. SSH requires proper authentication and authorization policies to control access, ensuring only authorized administrators can manage devices. Telnet, being an older protocol, lacks encryption and is vulnerable to credential theft and session hijacking. Cisco IOS devices support SSH configuration, allowing administrators to disable Telnet entirely, thereby enforcing secure management practices. This decision aligns with Cisco’s security fundamentals domain, emphasizing confidentiality and integrity in network management. A common exam trap is assuming SSH eliminates the need for authentication and authorization policies; however, SSH only secures the transport layer and does not replace access control mechanisms. Another misconception is that Telnet is required before SSH can operate, which is false since SSH functions independently. Additionally, SSH is not limited to wireless controllers but is widely used across various Cisco devices. Understanding these distinctions helps avoid errors and reinforces why SSH is the standard secure protocol for remote CLI administration in CCNA-level network security.
KKey Concepts to Remember
- SSH encrypts all remote management traffic, protecting sensitive operational data from interception during device administration.
- Telnet transmits data in plaintext, making it vulnerable to eavesdropping and credential theft on unsecured networks.
- Cisco devices prefer SSH over Telnet to enforce secure remote CLI access aligned with security best practices.
- SSH requires authentication and authorization policies to control access, ensuring only authorized users can manage devices.
- Telnet is considered a legacy protocol and is often disabled in secure Cisco network environments.
- SSH operates independently and does not require Telnet to be enabled or configured on Cisco devices.
- SSH is broadly supported across Cisco routers, switches, and wireless controllers for secure remote management.
- Using SSH instead of Telnet helps maintain confidentiality and integrity of administrative sessions in Cisco networks.
TExam Day Tips
- Watch for words such as best, first, most likely and least administrative effort.
- Review why wrong options are wrong, not only why the correct option is correct.
Related practice questions
Related 200-301 practice-question pages
Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.
CCNA subnetting practice questions
Practise IPv4 subnetting, CIDR, masks, host ranges and subnet selection.
CCNA OSPF practice questions
Practise OSPF neighbours, router IDs, metrics, areas and routing-table interpretation.
CCNA VLAN practice questions
Practise VLANs, access ports, trunks, allowed VLANs and switching scenarios.
CCNA STP practice questions
Practise spanning tree, root bridge election, port roles and STP troubleshooting.
CCNA EtherChannel practice questions
Practise LACP, PAgP, port-channel behaviour and bundle requirements.
CCNA ACL practice questions
Practise standard and extended ACLs, permit/deny logic and traffic filtering.
CCNA NAT practice questions
Practise static NAT, dynamic NAT, PAT and inside/outside address translation.
CCNA DHCP practice questions
Practise DHCP scopes, relay, leases and troubleshooting.
CCNA show ip route practice questions
Practise routing-table output, longest-prefix match, AD and route selection.
CCNA show interfaces trunk practice questions
Practise trunk verification and VLAN forwarding across switches.
CCNA wireless security practice questions
Practise WLAN security, authentication and wireless architecture concepts.
CCNA IPv6 practice questions
Practise IPv6 addressing, routes, neighbour discovery and common IPv6 exam traps.
More questions from this exam
Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.
Question 1
A router learns the same prefix from both OSPF and EIGRP. Which route is installed by default?
Question 2
A router shows this output: R1#show ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 10.1.1.2 1 FULL/DR 00:00:34 192.168.12.2 GigabitEthernet0/0 10.1.1.3 1 2WAY/DROTHER 00:00:39 192.168.12.3 GigabitEthernet0/0 Which statement is correct?
Question 3
What is the OSPF metric called?
Question 4
A non-root switch has two uplinks toward the root bridge. One path has a lower total STP cost than the other. What role will the lower-cost uplink have?
Question 5
A router interface applies this ACL inbound: 10 deny tcp any any eq 80 20 permit ip any any A user reports that web browsing to a server by IP address fails, but ping works. Which statement best explains the behavior?
Question 6
A router learns route 198.51.100.0/24 from OSPF with AD 110 and also has a static route to the same prefix configured with AD 150. Which route is installed?
FAQ
Questions learners often ask
What does this 200-301 question test?
SSH encrypts all remote management traffic, protecting sensitive operational data from interception during device administration.
What is the correct answer to this question?
The correct answer is: SSH is generally considered the more secure choice for remote CLI administration. — SSH is preferred because it provides protected remote administrative access, whereas Telnet is widely treated as a less secure legacy choice. In practical terms, administrators should recognize SSH as the safer standard option for command-line management sessions. This matters because remote management traffic often contains highly sensitive operational information. The question is about relative security posture, not about every protocol detail.
What should I do if I get this 200-301 question wrong?
Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.
Discussion
Sign in to join the discussion.