A system administrator is configuring UNIX accounts to authenticate against an external server. The configuration file asks for the following information DC=ServerName and DC=COM. Which of the following authentication services is being used?

A. RADIUS
B. SAML
C. TACACS
D. LDAP


Ans: D. LDAP

Computer Science & Information Technology

You might also like to view...

____ characterizes how effectively a given practice is being carried out.

A. Goal setting B. Capability C. Facility D. Utility

Computer Science & Information Technology

Write a function to create a movie where one item is moving from the top to the bottom and another item is moving from the bottom to the top.

What will be an ideal response?

Computer Science & Information Technology

You use the Report Header to create the ________ of a report

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is not a task handled by a router?

a. A router forwards broadcasts over the network. b. A router can reroute traffic if the path of first choice is down but a second path is available. c. A router can interpret Layer 3 and often Layer 4 addressing. d. A router can connect dissimilar networks.

Computer Science & Information Technology