Results from a vulnerability analysis indicate that all enabled virtual terminals on a router can be accessed using the same password. The companys network device security policy mandates that at least one virtual terminal have a different password than the other virtual terminals. Which of the following sets of commands would meet this requirement?
Comments