Which of the following would allow SSH to function properly? Scenario: A technician logs onto a system using Telnet as SSH is inaccessible. SSH is permitted on the target device, all subnets are given access. The technician discovers a critical step was missed.
Comments