Results from a vulnerability analysis indicate that all enabled virtual terminals on a router can
be accessed using the same password. The company’s network device security policy
mandates that at least one virtual terminal have a different password than the other virtual
terminals. Which of the following sets of commands would meet this requirement?
A.
line vty 0 6 P@s5W0Rd password line vty 7 Qwer++!Y password
B.
line console 0 password password line vty 0 4 password P@s5W0Rd
C.
line vty 0 3 password Qwer++!Y line vty 4 password P@s5W0Rd
D.
line vty 0 3 password Qwer++!Y line console 0 password P@s5W0Rd