Watch this video on YouTube
Which of the following is the MOST secure method for accessing a network device?