
Refer to the exhibit. An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH protocol. Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)
A. Configure an IP domain name.
B. Configure ACL 100 to permit access to port 22.
C. Configure a password under the vty lines.
D. Configure crypto keys.
E. Configure service password encryption.
Correct Answer: AD