Which of the following remote authentication methods was developed by Cisco?

A. 802.1X
B. TACACS+
C. RADIUS
D. Kerberos


B. TACACS+ (Terminal Access Controller Access Control System Plus) was developed by Cisco. It is considered more reliable than RADIUS.

Computer Science & Information Technology

You might also like to view...

__________ drivers are device drivers that accept file-oriented I/O requests and translate them to the appropriate primitive I/O commands for the physical device.

a. Network b. File system c. NTFS d. FAT-32

Computer Science & Information Technology

When you ____ an image, you import a copy of the image file that is still linked to the original.

a. position b. link c. place d. transform

Computer Science & Information Technology

To add details or descriptions into the Detail section:

A) type each one in individually on the query. B) drag fields from the Field List into the Detail section of the design grid. C) type each one in individually on the report. D) drag fields from the Field List into the Detail section of the report.

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

The Fourth Amendment to the U.S. Constitution (and each state’s constitution) protects everyone’s rights to be secure in their person, residence, and property from search and seizure.

Computer Science & Information Technology