Go back to
HP0-Y50 - Architecting HP FlexNetwork Solutions
If a network architect is planning a secure device management policy, why would administrators need to generate SSH keys on network infrastructure devices?
To authenticate managers with a more secure method than passwords
To encrypt management traffic and also authenticate managers with asymmetric
To authenticate managers and assign them privileges according to their identity
To encrypt management traffic related to the CLI
Want to practice for HP0-Y50 - Architecting HP FlexNetwork Solutions ?