To remotely manage a network switch without the graphical user interface, which of the following protocols offers an unencrypted command-line interface suitable for networks isolated from external threats?
Telnet, operating over port 23, offers a command-line interface for remotely managing devices such as network switches. While it does not encrypt communication, making it vulnerable to interception, it is suitable for use in environments isolated from external threats where encryption is not a primary concern.
Telnet, operating over port 23, offers a command-line interface for remotely managing devices such as network switches. While it does not encrypt communication, making it vulnerable to interception, it is suitable for use in environments isolated from external threats where encryption is not a primary concern.