answersLogoWhite

0


Best Answer

RTRA(config)# line vty 0 4

RTRA(config-line)# login

RTRA(config-line)# password Cisco

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which command or commands will require authentication to access the privileged exec mode?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Which router configuration mode will require user authentication if an administrator issues the enable secret command?

privileged executive mode


Which router CLI mode will require user authentication if an administrator issues the enable secret command?

It is the privilege mode.


What is the source of dos commands?

MS-DOS has two kinds of command sourceInternal commands: Any command which presents within command.com file is called internal commands. These commands does not require any external source or disk to run. Example: dir, copy, move, cd etc.External commands: Any command which presents in hard disk or outside command.com. Example: format, fdisk etc.


What is the difference between an internal and external command?

Internal commands are commands that are already loaded in the system, It can be executed at any time and are independent. external commands are loaded when the user requests them. Internal commands don't require a separate process to execute them.


Does radius require port-based authentication?

Yes, RADIUS requires port-based authentication.


Does kerberos require port based authentication?

No


What type of authentication does the DOD require to access sensitive data on mobile devices and or emailed?

two factor authentication


What type of authentication does the DOD require to access sensitive data on mobile devices or email?

two factor authentication


Categories require a privileged-level access agreement?

NONE


What is the difference between a tool and a command?

Tools are nearly the same as commands, except they require you to interact with the map canvas after they have been clicked. For example, the Split tool waits for you to select a point on the selected polyline feature, then breaks it into two features. Commands do not require you to interact with the map; instead, commands often rely on the current state of the map. The main editor commands reside on the Editor Menu, for example, the Start Editing and Stop Editing commands. The majority of the remaining commands reside on one of the editors context menus; for example, the Delete Vertex and the Finish Sketch commands.


What is the purpose of the network security authentication function?

To require users to prove who they are


What is the difference between using open authentication and pre-shared keys?

Open authentication requires a password. Pre-shared keys do not require a password.