1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
2 years ago
5

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.

Computers and Technology
1 answer:
Juli2301 [7.4K]2 years ago
3 0

Answer:

(config)# enable password secret

(config)# enable secret Encrypted_Password

(config-line)# password secret

(config)# enable secret Secret_Password

(config)# service password-encryption

Explanation:

To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command. This command encrypts all configured passwords in the configuration file. For more: https://ccnav7.net/what-command-will-prevent-all-unencrypted-passwords-from-displaying-in-plain-text-in-a-configuration-file-2/

You might be interested in
In G mail, when we want to write an email to multiple recipients in such a way that the recipients couldn't understand that we h
Inessa05 [86]

Answer:

Bcc

Explanation:

Every recipient email address you enter into the “to” and “cc” fields will be able to see each other. The email addresses you add to the “bcc” field will not be visible to the “to” and “cc” recipients or the other “bcc” recipients.

7 0
3 years ago
Read 2 more answers
A user has multiple web pages open and is using email. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/I
Fudgin [204]

Answer:

This is the second question like this I've seen. They aren't the greatest.

Explanation:

The question is not good. The answer would be option a, Transport even though it doesn't make a whole lot of sense when you really go into detail.

It could also be option d, Application but I think they're going for the first.

6 0
2 years ago
A team member was assigned 4 stories during sprint planning for a 2 week Sprint. Story 1 is easy to complete but does not add a
lbvjy [14]

Answer:

Option (B) is correct answer.

Explanation:

In this whole world, any person needs to do the task because of some profits. If there is a task with more points and if it is easy then it needs to be executed first.

Here in this question, story 2 is an easy task and gives more money, so that is to be executed first. Story 4 also gives more money but it is not easy so no one grantee to complete the task.

Hence option b is the correct answer. while the other option is not because--

  • Option "a" states about story 1, which is easy to complete but can not provide any type of value or money. So why anyone complete that task first which does not gives any types of profits.
  • Option c states about story 3, which is not easy to complete and also does not give any profits. So do not need to complete that task first which does not provide any profits and also that is difficult.
  • Option d states about story 4, which is not easy to complete but gives a lot of points. But there is no grantee that the task can complete in time. so no one needs to complete the risky task in the first order.

Hence the team member needs to execute the task in the following order--

  1. Story 2
  2. Story 4
  3. Story 1 and then
  4. Story 3

4 0
3 years ago
_____________ was largely responsible for the internet becoming a resource of information and not merely a medium to send and re
MissTica

Answer:

Tim Berners-Lee

Explanation:

In 1989, Tim Berners-Lee invented the World Wide Web, an Internet-based hypermedia initiative for global information sharing while at CERN, the European Particle Physics Laboratory. He wrote the first web client and server in 1990. His specifications of URIs, HTTP and HTML were refined as web technology spread.He is also known as TimBL, is an English engineer and computer scientist. He is a Professorial Fellow of Computer Science at the University of Oxford and a professor at the Massachusetts Institute of Technology.

5 0
4 years ago
Who is the mother of computer science ?<br>Thank you ~​
Pepsi [2]

Answer:

ADA LOVELACE

Explanation:

Ada Lovelace was born into a historically famous family. She could have lived well through her father's fame and her mother's money-instead she decided to write a computational algorithm, earning her the title of the mother of programming, and became the first computer programmer in the mid-1800s1,2.

HOPE IT'LL HELP

3 0
2 years ago
Read 2 more answers
Other questions:
  • Flesh out the body of the print_seconds function so that it prints the total amount of seconds given the hours, minutes, and sec
    12·1 answer
  • How can social media be useful for brand awareness ?
    14·1 answer
  • Emilio is reviewing the data he collected from historical records about immigration in the united states. He decides to create a
    5·1 answer
  • Which of the following is the process of transferring data in a continuous and even flow, which allows users to access and use a
    12·1 answer
  • 1. You are the network manager for a computer training center that allows students to bring their own laptops to class for learn
    5·1 answer
  • Complete the below method, isPalindrome(), that takes in a String and returns a boolean. The boolean should be true if the Strin
    7·1 answer
  • Can we opne a website form PowerPoint slide ​
    14·2 answers
  • What decides the amount of delay between shots on a digital camera?
    7·1 answer
  • When you get a new sim card do it come with a new number or do you have a activate the phone and get a new number in store ?
    9·1 answer
  • As part of its commitment to sustainability, a company is looking for a way to track the source of purchased goods and how they
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!