Answer: (B) A username name password password global configuration command and (C) A login local vty mode sub-command
Step-by-step explanation:
The secure shell requires the utilization of the usernames with the appropriate password. Utilizing the username worldwide order would be one approach to characterize the given usernames and also coordinating with the passwords to help the secure shell.
The local vty mode line should be arranged to require the utilization of the usernames and with the help of login nearby the vty mode sub-command. The input of the secure shell command are the main part of this configuration design but this command is not the worldwide configuration command.