What Cisco IOS command is used to create a local user along with a password that is highly secured, even with physical access to the device?

A) username username password password
B) username username secret password
C) user user password password
D) user user secret password


B
Explanation: B) As with the configuration of the enable password, there are two different methods for password creation when creating a user. Although the option using the password option obscures the password, it is not a highly secure method. The options using the secret option are highly secure and utilize the SHA-256 hash.

Computer Science & Information Technology

You might also like to view...

Using MySQL interactively, create a database named dbsam that the user named sam can modify and grant privileges on. Set up Sam’s password to be porcupine. The MySQL user named root has the password five22four.

What will be an ideal response?

Computer Science & Information Technology

Which of the following would be the best way to record to-do lists, phone numbers, or reminders that you could see immediately on your desktop?

A) Paint B) Sticky notes C) Wordpad D) Notepad

Computer Science & Information Technology

Discuss the functionality of PING.

What will be an ideal response?

Computer Science & Information Technology

To edit data in an embedded Excel worksheet object in a Word document Select one:

a. Edit the data in a Excel source application b. Use the Excel menu bar and toolbars inside the word application c. Edit the hyperlink d. Use the Word menu bar and toolbars

Computer Science & Information Technology