Which of the following would allow a network administrator to implement a user authentication
method that uses X.509 certificates?
A.
PKI
B.
Kerberos
C.
TACACS+
D.
RADIUS
Which of the following would allow a network administrator to implement a user authentication
method that uses X.509 certificates?
Which of the following would allow a network administrator to implement a user authentication
method that uses X.509 certificates?
A.
PKI
B.
Kerberos
C.
TACACS+
D.
RADIUS