.As part of a new initiative to tighten the security of your Cisco devices, you have configured the firewall to restrict access to the devices from the outside.
What would be other recommended ways of protecting the integrity of the device configuration files on the devices while ensuring your continued ability to manage the devices
remotely? (Choose all that apply.)
A. encrypt the configuration files
B. use SSH to connect to the devices for management
C. prevent the loss of administrator passwords by disabling their encryption
D. disable the VTY ports on the devices
E. use an encrypted password for VTY access