A security administrator is tasked with implementing centralized management of all network devices. Network administrators will be required to logon to network devices using their LDAP credentials. All command executed by network administrators on network devices must fall within a preset list of authorized commands and must be logged to a central facility. Which of the following configuration commands should be implemented to enforce this requirement?
A. LDAP server 10.55.199.3
B. CN=company, CN=com, OU=netadmin, DC=192.32.10.233
C. SYSLOG SERVER 172.16.23.50
D. TACAS server 192.168.1.100
Answer: B. CN=company, CN=com, OU=netadmin, DC=192.32.10.233
You might also like to view...
Use the sort (Sobell, page 975) utility to display the lines of the food file in alphabetical order.
What will be an ideal response?
A Bullets gallery is available that provides bullet characters to apply to a selection
Indicate whether the statement is true or false
The default calculation using the PMT function will produce a negative number
Indicate whether the statement is true or false
The subcontainer found under both the Computer and User Configuration Policies and Preferences containers that holds script and security settings is called ______________
a. Administrative templates b. Policies c. Preferences d. Windows Settings