Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption?
A. Multifactor authentication
B. ISAKMP
C. TACACS+
D. Network access control
Answer: C. TACACS+
Computer Science & Information Technology
You might also like to view...
A text file contains only text and numbers without any formulas, special fonts, graphics, or formatted text.? ?
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the following is the cheapest media for storing 8 GB of data?
A. DVD RW B. CD-ROM C. Tape backup D. DVD+R DL
Computer Science & Information Technology
The _______________ folder contains files that are not embedded in the SWF document, such as sound clips and placed videos.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The _________ defines the repertoire of machine language instructions that a computer can follow.
A. ABI B. API C. HLL D. ISA
Computer Science & Information Technology