Which of the following are considered AAA authentication methods? (Select TWO).
A. Kerberos
B. Radius
C. MS-CHAP
D. TACACS+
E. 802.1X
Answer:
B. Radius
D. TACACS+
You might also like to view...
________________ IPv6 addresses are used for one-to-one or one-to-many communication.
Fill in the blank(s) with the appropriate word(s).
A table style can include formatting for all of the following EXCEPT:
A) table columns. B) specific table elements. C) an entire table. D) the entire document.
What statement is true regarding RAM and ROM?
A) ROM commonly holds the computer operating system. B) ROM commonly holds stored user data such as photographs. C) RAM commonly stores data such as user photos that are retrieved on a later date. D) RAM contents are lost when the computer is powered off.
A technician can cause data loss on the hard drive if a mechanical hard drive is mishandled
Indicate whether the statement is true or false