Which of the following authentication methods prevents unauthorized execution of code on remote systems?

Which of the following authentication methods prevents unauthorized execution of code on remote
systems?

Which of the following authentication methods prevents unauthorized execution of code on remote
systems?

A.
TACACS

B.
S-RPC

C.
RADIUS

D.
CHAP



Leave a Reply 0

Your email address will not be published. Required fields are marked *