answersLogoWhite

0


Best Answer

VTY interface

console interface

privileged EXEC mode

User Avatar

Wiki User

12y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

12y ago

VTY interface

Console interface

Privileged EXEC mode

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Passwords can be used to restrict access to all or parts of the Cisco IOS Select the modes and interfaces that can be protected with passwords Choose three?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Why do you use passwords?

People use passwords to protect their security. By the use of passwords you can restrict assess to something to people that know the password. This also allows you to keep some privacy.


Who uses passwords?

People use passwords, and for many reasons. Most people use passwords to protect their security. By the use of passwords you can restrict assess to something to people that know the password. This also allows you to keep some privacy.


What are computer use for password?

passwords in computers are used for security.


Who uses password and why?

People use passwords to protect their security. By the use of passwords you can restrict assess to something to people that know the password. This also allows you to keep some privacy.


What is use of password?

People use passwords to protect their security. By the use of passwords you can restrict assess to something to people that know the password. This also allows you to keep some privacy.


Why do use password?

People use passwords to protect their security. By the use of passwords you can restrict assess to something to people that know the password. This also allows you to keep some privacy.


What is the password for?

Passwords are to restrict others from accessing your secret or private information to know more www.esecured.co.cc


Why is it necessary to have a password?

The whole point of password is to protect the private content of the persons account. There is absolutely no point in them being published in the open domain. This would constitute a serious breach of the Data protection act.


What is a string of characters used to restrict access to a user accounts?

a password. different programs/websites have different rules on passwords: minimum and maximum length; some are letters & numbers only, some can or must contain other characters. A "LOGIN" is a combination of a USERNAME and a PASSWORD that are both required for access.


Can you restrict who follows you if your twitter account is not protected?

If you're Twitter account isn't protected then anyone can follow you unless you block them.


What is software restriction?

Lots of software and systems restrict access in different ways, like by having passwords. Some users may be allowed to do more things than others can, or have the ability to see and change things that others can't change, or even see. This adds security to how systems operate and prevent some problems and people taking advantage of situations where they have access to important information.


What is the advantage of adding networks with a wildcard mask instead of using classful network addresses?

In OSPF, interfaces can be assigned to different areas. Many times, a router will be routing inside of a major network, but different interfaces will belong to different areas. You need the level of control given by wildcard masks to assign different interfaces to their appropriate areas, and not restrict an entire major network to be in one area.