When configuring a router, you control access to privileged EXEC mode by configuring which password?
a. Line console.
b. Line vty.
c. Enable.
d. Secret.
Ans: c. Enable.
Computer Science & Information Technology
You might also like to view...
Schemes consist of rules that combine data values in specific formats and locations to generate a new data values
Indicate whether the statement is true or false
Computer Science & Information Technology
Each gate is defined in three ways: graphic symbol, algebraic notation, and __________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology