Which of the following can be used to control specific commands that can be executed on a network infrastructure device?

A. LDAP
B. Kerberos
C. SAML
D. TACACS+

Answer: D. TACACS+

Computer Science & Information Technology

You might also like to view...

The ____ operator is used for exponentiation.

A. * B. ^ C. ˜ D. \

Computer Science & Information Technology

A _________________ occurs when an attacker generates transmissions that appear, to the switch, to belong to a protected VLAN.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology