WHICH PROCEDURE IS USED TO ACCESS A CISCO 2960 SWITCH WHEN PERFORMING AN INITIAL CONFIGURATION IN A SECURE ENVIRONMENT?
A.
Use the console port to locally access the switch from a serial or USB interface of the PC.
B.
Use the AUX port to locally access the switch from a serial or USB interface of the P
C.
Use Secure Shell to remotely access the switch through the network.
D.
Use Telnet to remotely access the switch through the network.