Results from a vulnerability analysis indicate that all enabled virtual terminals on a router can be accessed using the same password. The company's network device security policy mandates that at least one virtual terminal have a different password than the other virtual terminals. Which of the following sets of commands would meet this requirement?

A. line vty 0 6 P@s5W0Rd password line vty 7 Qwer++!Y password
B. line console 0 password password line vty 0 4 password P@s5W0Rd
C. line vty 0 3 password Qwer++!Y line vty 4 password P@s5W0Rd
D. line vty 0 3 password Qwer++!Y line console 0 password P@s5W0Rd


Answer: C. line vty 0 3 password Qwer++!Y line vty 4 password P@s5W0Rd

Computer Science & Information Technology

You might also like to view...

One of your systems analysis team members has been discouraging user input on quality standards, arguing that because you are the experts, you are really the only ones who know what constitutes a quality system. In a paragraph, explain to your team member why getting user input is critical to system quality. Use an example.

What will be an ideal response?

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. A wireless transmission medium that distributes radio signals through the air over long distances B. A form of broadcast radio that is used widely for mobile communications C. Expected to provide artificial intelligence capabilities on wearable devices D. Examples of standards in this category include EDGE and UMTS E. Category of cellular transmission that transmits digital data at speeds up to 100 Mbps F. Type of lines that can be either analog or digital G. Protocol that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person H. Consists of a single copper wire surrounded by at least three layers I. Can be negatively affected by the distance between two points, the type of transmission media, and the  number of nodes through which data must travel J. Kind of cable designed to reduce noise K. This kind of device contains a small chip that allows it to communicate with other similar devices L. A network standard that specifies how two devices use short-range radio waves to communicate at high speeds with each other M. The core of this kind of cable consists of dozens or hundreds of thin strands of glass or plastic that use light to transmit signals. N. Kind of network that is sometimes called a file sharing network O. Contactless payment uses this technology.

Computer Science & Information Technology

For large arrays, making duplicate copies of the array for each function call would waste computer storage, consume execution time, and frustrate the effort to return multiple element changes made by the called program.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

________ printers combine either inkjet or laser printing capabilities with scanning, photocopying, and faxing capabilities.

A. Multifunction B. Flatbed C. Dye-sub D. Dot matrix

Computer Science & Information Technology