A company would like to implement two-factor authentication for its vulnerability management database to require system administrators to use their token and random PIN codes. Which of the following authentication services accomplishes this objective?

A. SAML
B. TACACS+
C. Kerberos
D. RADIUS


Answer: D. RADIUS

Computer Science & Information Technology

You might also like to view...

Developed by Apple Computer for the Macintosh, ____________________ movies can also be played in Windows if the user has installed the proper software.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Examining policies allows the systems analyst to gain an awareness of the values, attitudes, and beliefs that are guiding the corporation. 2. Observation is an information gathering technique that allows the analyst to see firsthand how managers process and use information. 3. A policy handbook is an organized and systematic approach that demands that analysts understand and articulate the action taken by decision makers being observed. 4. A form of structured observation having roots in film criticism is known as ROBE.

Computer Science & Information Technology

Use Microsoft Visio or Visible Analyst to view and print the use case diagram for the computer inventory system.

What will be an ideal response?

Computer Science & Information Technology

The primary function of the ____________________ layer is to provide a globally unique address to every host on the Internet and paths to and from hosts.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology