Jane, a security administrator, has been tasked with explaining authentication services to the company's management team. The company runs an active directory infrastructure. Which of the following solutions BEST relates to the host authentication protocol within the company's environment?
A. Kerberos
B. Least privilege
C. TACACS+
D. LDAP
Answer: A. Kerberos
Computer Science & Information Technology
You might also like to view...
What is an extended virtual connection?
What will be an ideal response?
Computer Science & Information Technology
The document in which new styles are stored
a. All documents b. The current document c. New templates
Computer Science & Information Technology
Establishing the correct permission level for each SharePoint user and group in your organization is critical to maintaining a(n) ________ online environment for collaboration
A) enjoyable B) error free C) secure D) controlled
Computer Science & Information Technology
Distributed data processing reduces the risk of operational inefficiencies.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology