What is the command for setting password protection for privileged mode, if the password is tech?
a. enable tech
b. enable secret tech
c. enabling secret tech
d. enabling tech
b. enable secret tech
You might also like to view...
When do we use an adjacency list?
a. For a graph that is undirected b. When sorting a list c. When searching through a list for an element d. For a hash table
You have seen the reported problem that the computer will not boot. Which step of the troubleshooting process will you do next?
A) Establish a theory of probable cause. B) Test a theory to determine the cause. C) Identify the problem. D) Establish a plan of action.
To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known __________ in their knowledge base.
A. vulnerabilities B. fingerprints C. signatures D. footprints
You should use the for statement to generate repetitive flow behavior when you do not know in advance the number of repetitions required.
Answer the following statement true (T) or false (F)