Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption?

A. Multifactor authentication
B. ISAKMP
C. TACACS+
D. Network access control


Answer: C. TACACS+

Computer Science & Information Technology

You might also like to view...

A text file contains only text and numbers without any formulas, special fonts, graphics, or formatted text.? ?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is the cheapest media for storing 8 GB of data?

A. DVD RW B. CD-ROM C. Tape backup D. DVD+R DL

Computer Science & Information Technology

The _______________ folder contains files that are not embedded in the SWF document, such as sound clips and placed videos.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The _________ defines the repertoire of machine language instructions that a computer can follow.

A. ABI B. API C. HLL D. ISA

Computer Science & Information Technology