Which of the following protocols is MOST likely to be leveraged by users who need additional information about another user?

Which of the following protocols is MOST likely to be leveraged by users who need additional
information about another user?

Which of the following protocols is MOST likely to be leveraged by users who need additional
information about another user?

A.
LDAP

B.
RADIUS

C.
Kerberos

D.
TACACS+



Leave a Reply 0

Your email address will not be published. Required fields are marked *

five × three =