A technician is troubleshooting authentication issues on a server. It turns out the clock on the server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario, which of the following authentication methods was being used?

A. Kerberos
B. CHAP
C. TACACS+
D. RADIUS


Answer: A. Kerberos

Computer Science & Information Technology

You might also like to view...

When editing the shape and placement of paths, the ____ Tool moves individual anchor points and direction points.

a. Direct Selection b. Free Pen c. Path Selection d. Drawing

Computer Science & Information Technology

Compressing pictures in a presentation will make the file size ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

In what year was the Privacy Act passed?

What will be an ideal response?

Computer Science & Information Technology

Large organizations use ________ systems because they bring together many types of business functions into one software solution.

A. ERP B. IDE C. SDLC D. CAD

Computer Science & Information Technology