Which method of managing wireless access points is considered secure?

Prepare for the NCTI Field Tech II to III Exam with comprehensive quizzes. Enhance your skills with multiple choice questions, helpful hints, and detailed explanations. Get ready to advance your career!

Using SSH (Secure Shell) to manage wireless access points is considered secure because it provides an encrypted communication channel over an unsecured network. SSH ensures that all data transmitted between the client and server is protected from eavesdropping, making it incredibly difficult for unauthorized individuals to capture or manipulate the data. This level of security is essential for managing network devices, as it prevents potential attackers from gaining access to sensitive configuration information or management commands.

In contrast, options such as using a web server only might not incorporate proper security measures, leaving it vulnerable to attacks like man-in-the-middle. Similarly, Telnet is known for transmitting data, including usernames and passwords, in plaintext, which can be easily intercepted, rendering it insecure for sensitive management tasks. Utilizing a command line exclusively does not inherently provide security; it depends on how the commands are executed and the underlying protocols that are used for the connection. Hence, SSH stands out as the most secure method among the options provided.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy