Chris uses a packet sniffer to capture traffic from a TACACS+ server. What protocol should he monitor, and what data should he expect to be readable?
A. UDP; none—TACACS+ encrypts the full session
B. TCP; none—TACACS+ encrypts the full session
C. UDP; all but the username and password, which are encrypted
D. TCP; all but the username and password, which are encrypted
Answer: B. TCP; none—TACACS+ encrypts the full session
Computer Science & Information Technology
You might also like to view...
Visualizations are splashes of color and geometric shapes that change with the music playing
Indicate whether the statement is true or false
Computer Science & Information Technology
This stage in the evolution of the modern IT infrastructure represented the original BYOD phenomenon.
A. Cloud and mobile computing B. Enterprise computing C. LANs (client/server computing) D. Stand-alone PCs
Computer Science & Information Technology