CIS
5.2.1.4 Packet Tracer - Configuring SSH Instruction.pdf

D verify that the passwords are encrypted part 2

Info icon This preview shows pages 1–2. Sign up to view the full content.

encrypts plain text passwords. d. Verify that the passwords are encrypted. Part 2: Encrypt Communications Step 1: Set the IP domain name and generate secure keys. It is generally not safe to use Telnet, because data is transferred in plain text. Therefore, use SSH whenever it is available. a. Configure the domain name to be netacad.pka .
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.