What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
- AAllow unrestricted access to the console or VTY ports
- BUse a firewall to restrict access from the outside to the network devices
- CAlways use Telnet to access the device command line because its data is automatically encrypted
- DUse SSH or another encrypted and authenticated transport to access device configurations
- EPrevent the loss of passwords by disabling password encryptio