tejas wants to be able to manage a variety of devices on his network while ensuring that the communications of the management system are encrypted. which of the following should he implement?