If a network architect is planning a secure device management policy, why would administrators need to generate SSH keys on network infrastructure devices?
A . To authenticate managers with a more secure method than passwords
B . To encrypt management traffic and also authenticate managers with asymmetric
C . To authenticate managers and assign them privileges according to their identity
D . To encrypt management traffic related to the CLI
Answer: D