What Cisco IOS command is used to create a local user along with a password that is highly secured, even with physical access to the device?
A) username username password password
B) username username secret password
C) user user password password
D) user user secret password
B
Explanation: B) As with the configuration of the enable password, there are two different methods for password creation when creating a user. Although the option using the password option obscures the password, it is not a highly secure method. The options using the secret option are highly secure and utilize the SHA-256 hash.
You might also like to view...
Using MySQL interactively, create a database named dbsam that the user named sam can modify and grant privileges on. Set up Sam’s password to be porcupine. The MySQL user named root has the password five22four.
What will be an ideal response?
Which of the following would be the best way to record to-do lists, phone numbers, or reminders that you could see immediately on your desktop?
A) Paint B) Sticky notes C) Wordpad D) Notepad
Discuss the functionality of PING.
What will be an ideal response?
To edit data in an embedded Excel worksheet object in a Word document Select one:
a. Edit the data in a Excel source application b. Use the Excel menu bar and toolbars inside the word application c. Edit the hyperlink d. Use the Word menu bar and toolbars