Which of the following can be used to control specific commands that can be executed on a network
infrastructure device?
A.
LDAP
B.
Kerberos
C.
SAML
D.
TACACS+
Which of the following can be used to control specific commands that can be executed on a network
infrastructure device?
Which of the following can be used to control specific commands that can be executed on a network
infrastructure device?
A.
LDAP
B.
Kerberos
C.
SAML
D.
TACACS+