When granting access, which of the following protocols uses multiple-challenge responses for authentication, authorization and audit?
A.
TACACS
B.
TACACS+
C.
LDAP
D.
RADIUS
When granting access, which of the following protocols uses multiple-challenge responses for authentication, authorization and audit?
When granting access, which of the following protocols uses multiple-challenge responses for authentication, authorization and audit?
A.
TACACS
B.
TACACS+
C.
LDAP
D.
RADIUS