A technician is troubleshooting authentication issues on a server. It turns out the clock on the server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario, which of the following authentication methods was being used?
A. Kerberos
B. CHAP
C. TACACS+
D. RADIUS
Answer: A. Kerberos
Computer Science & Information Technology
You might also like to view...
When editing the shape and placement of paths, the ____ Tool moves individual anchor points and direction points.
a. Direct Selection b. Free Pen c. Path Selection d. Drawing
Computer Science & Information Technology
Compressing pictures in a presentation will make the file size ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
In what year was the Privacy Act passed?
What will be an ideal response?
Computer Science & Information Technology
Large organizations use ________ systems because they bring together many types of business functions into one software solution.
A. ERP B. IDE C. SDLC D. CAD
Computer Science & Information Technology