Which of the following is a proprietary protocol commonly used for router authentication across an enterprise?

A. SAML
B. TACACS
C. LDAP
D. RADIUS


Answer: B. TACACS

Computer Science & Information Technology

You might also like to view...

Reports and subreports often show related records from tables in a many-to-many relationship

Indicate whether the statement is true or false

Computer Science & Information Technology

You can check your computer's system information for the clock speed of your processor, which may be called the ____.

A. Central Processing Unit (CPU) B. hard drive C. data cache D. lookaside buffer

Computer Science & Information Technology

"AZ" is an example of a ____.

A. column heading B. row heading C. cell reference D. Name box

Computer Science & Information Technology

The sleep mode on a computer generally saves more electricity than hibernate mode.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology