subject

Step 3: configure basic settings for each router.
a. assign a device name to the router
b. disable dns lookup to prevent the router from attempting to translate incorrectly entered commands as
though they were host names.
c. assign class as the privileged exec encrypted password.
d. assign cisco as the console password and enable login.
e. assign cisco as the vty password and enable login
f. encrypt the plaintext passwords.
g. create a banner that warns anyone accessing the device that unauthorized access is prohibited.
h. save the running configuration to the startup configuration file.
i. set the clock on the router to today's time and date.
note: use the question mark to with the correct sequence of parameters needed to execute this

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 23:00, cchotshot
Is an attack that relies on guessing the isns of tcp packets
Answers: 2
image
Computers and Technology, 23.06.2019 07:30, jackie0833
Which option allows you to view slides on the full computer screen?
Answers: 1
image
Computers and Technology, 24.06.2019 01:00, kkruvc
Mastercard managers are motivated to increase (1) the number of individuals who have and use a mastercard credit card, (2) the number of banks and other clents who issue mastercards to customers and/or employees, and (3) the number of locations that accept mastercard payments. discuss how mastercard could use its data warehouse to it expand each of these customer bases.
Answers: 3
image
Computers and Technology, 24.06.2019 04:30, andrespacheco5888
Which of the following terms refers to a collection of different types of software that share the goal of infiltrating a computer and making it do something? a- malware b- virus c- spyware d- trojan horse
Answers: 2
You know the right answer?
Step 3: configure basic settings for each router.
a. assign a device name to the router
...

Questions in other subjects:

Konu
English, 03.08.2019 20:30
Konu
History, 03.08.2019 20:30