Which of the following authentication protocols could be used to authenticate network
administrators at a datacenter to manage switches over a remote SSH connection? (Select TWO.)
A.
LDAP
B.
TACACS
C.
RADIUS
D.
SNMP
E.
IPSec
F.
MSCHAP
Which of the following authentication protocols could be used to authenticate network
administrators at a datacenter to manage switches over a remote SSH connection? (Select TWO.)
Which of the following authentication protocols could be used to authenticate network
administrators at a datacenter to manage switches over a remote SSH connection? (Select TWO.)
A.
LDAP
B.
TACACS
C.
RADIUS
D.
SNMP
E.
IPSec
F.
MSCHAP