Which of the following can be configured to authenticate and enforce these shell restrictions?

A network security engineer would like to allow authorized groups to access network devices with
a shell restricted to only show information while still authenticating the administrator’s group to an
unrestricted shell. Which of the following can be configured to authenticate and enforce these shell
restrictions? (Select TWO).

A network security engineer would like to allow authorized groups to access network devices with
a shell restricted to only show information while still authenticating the administrator’s group to an
unrestricted shell. Which of the following can be configured to authenticate and enforce these shell
restrictions? (Select TWO).

A.
Single Sign On

B.
Active Directory

C.
Kerberos

D.
NIS+

E.
RADIUS

F.
TACACS+



Leave a Reply 0

Your email address will not be published. Required fields are marked *