Within theFLDTECtraining, especially underMaintenance and RMA Procedures, there is a strong emphasis on safely transferring and adapting configurations from failed or decommissioned devices to replacement units.
The official guidance includes the following:
"When reusing a configuration from an old device, make sure to retain the necessary security elements such as username entries. This ensures the replacement device is still accessible under the correct user credentials."
Here's a breakdown of why the correct answer isB:
A. Remove all configurations under line vty 0 4:This would eliminate remote access settings, making it harder to manage the device.
B. Retain all username entries:Correct. Keeping the username entries ensures continued secure access and avoids loss of administrative control.
C. Keep all access-list commands intact:Not always required — ACLs are often tailored to interface-specific settings or environments which may differ between devices.
D. Add the enable password cisco command:Not a best practice. Default passwords (like cisco) should be avoided for security reasons, and it's not required if enable secret is already in use.
===========
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit