Which of the following is mainly used for remote access into the network?

A. XTACACS
B. TACACS
C. Kerberos
D. RADIUS


Answer: D. RADIUS

Computer Science & Information Technology

You might also like to view...

Match each term with the correct statement below.

A. Works with criminal investigators to process evidence of criminal activity B. Involves all of the actions that are done to ensure that the human resources element of the organization is strictly under control C. Involves those policies, processes, procedures, and technologies that might be used to identify all relevant risks to information assets, personnel, facilities, and equipment D. A formally recognized documentation of competency in an area of professional work E. Sets policy F. Develops a physical and environmental security plan that specifies all formal security tests and contingency plans G. Carries out the vulnerability analysis H. Implements policy I. Involves all of the organization's controls that are designed to make sure that the organization is safe from man-made or natural disasters

Computer Science & Information Technology

When the insertion point is positioned at a ________ tab stop, text that is inserted moves to the left of the tab stop

A) Left B) Right C) Center D) Decimal

Computer Science & Information Technology

Which of the following ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices?

A. HDMI B. MiniDP C. S/PDIF D. eSATA

Computer Science & Information Technology

When you ____ a file, it is no longer available to your application.

A. examine B. rewrite C. close D. index

Computer Science & Information Technology