Results from a vulnerability analysis indicate that all enabled virtual terminals on a router
can be accessed using the same password. The companys network device security policy
mandates that at least one virtual terminal have a different password than the other virtual
terminals. Which of the following sets of commands would meet this requirement?