Which of the following is mainly used for remote access into the network?
A. XTACACS
B. TACACS
C. Kerberos
D. RADIUS
Answer: D. RADIUS
You might also like to view...
Match each term with the correct statement below.
A. Works with criminal investigators to process evidence of criminal activity B. Involves all of the actions that are done to ensure that the human resources element of the organization is strictly under control C. Involves those policies, processes, procedures, and technologies that might be used to identify all relevant risks to information assets, personnel, facilities, and equipment D. A formally recognized documentation of competency in an area of professional work E. Sets policy F. Develops a physical and environmental security plan that specifies all formal security tests and contingency plans G. Carries out the vulnerability analysis H. Implements policy I. Involves all of the organization's controls that are designed to make sure that the organization is safe from man-made or natural disasters
When the insertion point is positioned at a ________ tab stop, text that is inserted moves to the left of the tab stop
A) Left B) Right C) Center D) Decimal
Which of the following ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices?
A. HDMI B. MiniDP C. S/PDIF D. eSATA
When you ____ a file, it is no longer available to your application.
A. examine B. rewrite C. close D. index