Results from a vulnerability analysis indicate that all enabled virtual terminals on a router can be
accessed using the same password. The company’s network device security policy mandates that
at least one virtual terminal have a different password than the other virtual terminals. Which of the
following sets of commands would meet this requirement?
A.
line vty 0 6 P@s5W0Rd password line vty 7 Qwer++!Y password
B.
line console 0 password password line vty 0 4 password P@s5W0Rd
C.
line vty 0 3 password Qwer++!Y line vty 4 password P@s5W0Rd
D.
line vty 0 3 password Qwer++!Y line console 0 password P@s5W0Rd
Explanation: