A network administrator is configuring remote access to a switch to perform management tasks securely from any location in the corporate network. Which of the following protocols should the administrator use to ensure that the traffic is encrypted?
Secure Shell (SSH)
Console
Telnet
AUX port