COMPUTER NETWORKING

NETWORK LAYER

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What command allows you to secure remote access?
A
line vty 0 4password
B
line vty 0 15password
C
line vty 1 5encrypt
D
line vty 0 15encrypt
Explanation: 

Detailed explanation-1: -VTY lines are usually used for creating out-of-band management sessions to devices. If a password is not supplied on a vty line, that line cannot be used for managing the device. In some cases administrators may decide to let junior staff to use lines 0-4 and senior staff to use lines 5-15.

Detailed explanation-2: -VTY is a virtual port and used to get Telnet or SSH access to the device. VTY is solely used for inbound connections to the device. These connections are all virtual with no hardware associated with them. The abstract “0 – 4” means that the device can allow 5 simultaneous virtual connections which may be Telnet or SSH.

There is 1 question to complete.