Jane, a security administrator, has been tasked with explaining authentication services to the company's management team. The company runs an active directory infrastructure. Which of the following solutions BEST relates to the host authentication protocol within the company's environment?

A. Kerberos
B. Least privilege
C. TACACS+
D. LDAP


Answer: A. Kerberos

Computer Science & Information Technology

You might also like to view...

What is an extended virtual connection?

What will be an ideal response?

Computer Science & Information Technology

The document in which new styles are stored

a. All documents b. The current document c. New templates

Computer Science & Information Technology

Establishing the correct permission level for each SharePoint user and group in your organization is critical to maintaining a(n) ________ online environment for collaboration

A) enjoyable B) error free C) secure D) controlled

Computer Science & Information Technology

Distributed data processing reduces the risk of operational inefficiencies.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology