Which of the following is a proprietary protocol commonly used for router authentication across an enterprise?
A. SAML
B. TACACS
C. LDAP
D. RADIUS
Answer: B. TACACS
Computer Science & Information Technology
You might also like to view...
Reports and subreports often show related records from tables in a many-to-many relationship
Indicate whether the statement is true or false
Computer Science & Information Technology
You can check your computer's system information for the clock speed of your processor, which may be called the ____.
A. Central Processing Unit (CPU) B. hard drive C. data cache D. lookaside buffer
Computer Science & Information Technology
"AZ" is an example of a ____.
A. column heading B. row heading C. cell reference D. Name box
Computer Science & Information Technology
The sleep mode on a computer generally saves more electricity than hibernate mode.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology