Which of the following can be used to control specific commands that can be executed on a network infrastructure device?
A. LDAP
B. Kerberos
C. SAML
D. TACACS+
Answer: D. TACACS+
Computer Science & Information Technology
You might also like to view...
The ____ operator is used for exponentiation.
A. * B. ^ C. ˜ D. \
Computer Science & Information Technology
A _________________ occurs when an attacker generates transmissions that appear, to the switch, to belong to a protected VLAN.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology