What is the command for setting password protection for privileged mode if the password is Tech?

What will be an ideal response?


enable secret Tech

Computer Science & Information Technology

You might also like to view...

The ____________ is critical to ICT acquisition because it provides the sole point of reference for the bidding process.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Within the Properties dialog box for a file on the General Tab, there are additional properties that can be viewed and changed, such as:

A) attributes. B) the date the file was last accessed. C) keywords. D) backstage options.

Computer Science & Information Technology

____ are designed to prevent loops in a bridged (switched) LAN.

A. Spinning trees B. Branching trees C. Spanning trees D. Binary trees

Computer Science & Information Technology

The recursion is said to be deep when _____.

A. there are few recursive calls B. its efficiency is quadratic C. its efficiency is exponential D. there are many recursive calls

Computer Science & Information Technology