12. Which of the following statements about VTY is correct? OA. The maximum number of VTY interfaces that can be used is the same for different devices or VRP systems in different versions. OB. Each device supports access of multiple VTY users simultaneously. OC. Each VTY user corresponds to a physical interface. OD. Non-password authentication is not supported.
12. Which of the following statements about VTY is correct? OA. The maximum number of VTY interfaces that can be used is the same for different devices or VRP systems in different versions. OB. Each device supports access of multiple VTY users simultaneously. OC. Each VTY user corresponds to a physical interface. OD. Non-password authentication is not supported.
Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter8: Security Management Models
Section: Chapter Questions
Problem 19RQ
Related questions
Question
![12. Which of the following statements about VTY is correct?
OA. The maximum number of VTY interfaces that can be used is the same for different devices or VRP systems in different versions.
OB. Each device supports access of multiple VTY users simultaneously.
OC. Each VTY user corresponds to a physical interface.
OD. Non-password authentication is not supported.](/v2/_next/image?url=https%3A%2F%2Fcontent.bartleby.com%2Fqna-images%2Fquestion%2Fefd31d84-af5f-44f4-862d-5ae317cc6363%2Fd51ef8be-2582-447d-82a0-6fa3bb533bc3%2Fmohnafd_processed.jpeg&w=3840&q=75)
Transcribed Image Text:12. Which of the following statements about VTY is correct?
OA. The maximum number of VTY interfaces that can be used is the same for different devices or VRP systems in different versions.
OB. Each device supports access of multiple VTY users simultaneously.
OC. Each VTY user corresponds to a physical interface.
OD. Non-password authentication is not supported.
Expert Solution
![](/static/compass_v2/shared-icons/check-mark.png)
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 2 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
![Management Of Information Security](https://www.bartleby.com/isbn_cover_images/9781337405713/9781337405713_smallCoverImage.gif)
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,
![Management Of Information Security](https://www.bartleby.com/isbn_cover_images/9781337405713/9781337405713_smallCoverImage.gif)
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,