A security administrator is tasked with implementing centralized management of all network devices. Network administrators will be required to logon to network devices using their LDAP credentials. All command executed by network administrators on network devices must fall within a preset list of authorized commands and must be logged to a central facility. Which of the following configuration commands should be implemented to enforce this requirement?

A. LDAP server 10.55.199.3
B. CN=company, CN=com, OU=netadmin, DC=192.32.10.233
C. SYSLOG SERVER 172.16.23.50
D. TACAS server 192.168.1.100


Answer: B. CN=company, CN=com, OU=netadmin, DC=192.32.10.233

Computer Science & Information Technology

You might also like to view...

Use the sort (Sobell, page 975) utility to display the lines of the food file in alphabetical order.

What will be an ideal response?

Computer Science & Information Technology

A Bullets gallery is available that provides bullet characters to apply to a selection

Indicate whether the statement is true or false

Computer Science & Information Technology

The default calculation using the PMT function will produce a negative number

Indicate whether the statement is true or false

Computer Science & Information Technology

The subcontainer found under both the Computer and User Configuration Policies and Preferences containers that holds script and security settings is called ______________

a. Administrative templates b. Policies c. Preferences d. Windows Settings

Computer Science & Information Technology