When configuring a router, you control access to privileged EXEC mode by configuring which password?

a. Line console.
b. Line vty.
c. Enable.
d. Secret.


Ans: c. Enable.

Computer Science & Information Technology

You might also like to view...

With a(n) ____, the employee is normally leaving the company under mutually agreeable terms.

A. unfriendly termination B. friendly termination C. hard termination D. prejudicial termination

Computer Science & Information Technology

Most database software is ____ sensitive.

A. case B. file C. field D. record

Computer Science & Information Technology

What does the following code print?

``` System.out.printf("*%n**%n***%n****%n*****%n"); ```

Computer Science & Information Technology

Match each item with a statement below:

A. a specification for exchanging information between a Web server and an application program B. a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script C. mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks D. environment variable that can be used by a Perl program E. a central Web repository for Perl modules and extensions F. considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API G. a stream cipher designed by Ron Rivest for RSA Data Security H. provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL I. also referred to as the "libwww-perl" collection

Computer Science & Information Technology