When configuring a router, you control access to privileged EXEC mode by configuring which password?

a. Line console.
b. Line vty.
c. Enable.
d. Secret.

Ans: c. Enable.

Computer Science & Information Technology

You might also like to view...

Schemes consist of rules that combine data values in specific formats and locations to generate a new data values

Indicate whether the statement is true or false

Computer Science & Information Technology

Each gate is defined in three ways: graphic symbol, algebraic notation, and __________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology