When configuring a router, you control access to privileged EXEC mode by configuring which password?
a. Line console.
b. Line vty.
c. Enable.
d. Secret.
Ans: c. Enable.
You might also like to view...
With a(n) ____, the employee is normally leaving the company under mutually agreeable terms.
A. unfriendly termination B. friendly termination C. hard termination D. prejudicial termination
Most database software is ____ sensitive.
A. case B. file C. field D. record
What does the following code print?
``` System.out.printf("*%n**%n***%n****%n*****%n"); ```
Match each item with a statement below:
A. a specification for exchanging information between a Web server and an application program B. a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script C. mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks D. environment variable that can be used by a Perl program E. a central Web repository for Perl modules and extensions F. considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API G. a stream cipher designed by Ron Rivest for RSA Data Security H. provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL I. also referred to as the "libwww-perl" collection