Which of the following would allow a network administrator to implement a user authentication method that uses X.509 certificates?

Which of the following would allow a network administrator to implement a user authentication
method that uses X.509 certificates?

Which of the following would allow a network administrator to implement a user authentication
method that uses X.509 certificates?

A.
PKI

B.
Kerberos

C.
TACACS+

D.
RADIUS



Leave a Reply 0

Your email address will not be published. Required fields are marked *