When granting access, which of the following protocols uses multiple-challenge responses for
authentication, authorization and audit?
A.
TACACS
B.
TACACS+
C.
LDAP
D.
RADIUS
Explanation:
When granting access, which of the following protocols uses multiple-challenge responses for
authentication, authorization and audit?
When granting access, which of the following protocols uses multiple-challenge responses for
authentication, authorization and audit?
A.
TACACS
B.
TACACS+
C.
LDAP
D.
RADIUS
Explanation: