A company would like to implement two-factor authentication for its vulnerability management database to require system administrators to use their token and random PIN codes. Which of the following authentication services accomplishes this objective?
A. SAML
B. TACACS+
C. Kerberos
D. RADIUS
Answer: D. RADIUS
You might also like to view...
Developed by Apple Computer for the Macintosh, ____________________ movies can also be played in Windows if the user has installed the proper software.
Fill in the blank(s) with the appropriate word(s).
Answer the following statements true (T) or false (F)
1. Examining policies allows the systems analyst to gain an awareness of the values, attitudes, and beliefs that are guiding the corporation. 2. Observation is an information gathering technique that allows the analyst to see firsthand how managers process and use information. 3. A policy handbook is an organized and systematic approach that demands that analysts understand and articulate the action taken by decision makers being observed. 4. A form of structured observation having roots in film criticism is known as ROBE.
Use Microsoft Visio or Visible Analyst to view and print the use case diagram for the computer inventory system.
What will be an ideal response?
The primary function of the ____________________ layer is to provide a globally unique address to every host on the Internet and paths to and from hosts.
Fill in the blank(s) with the appropriate word(s).