Chris uses a packet sniffer to capture traffic from a TACACS+ server. What protocol should he monitor, and what data should he expect to be readable?

A. UDP; none—TACACS+ encrypts the full session
B. TCP; none—TACACS+ encrypts the full session
C. UDP; all but the username and password, which are encrypted
D. TCP; all but the username and password, which are encrypted

Answer: B. TCP; none—TACACS+ encrypts the full session

Computer Science & Information Technology

You might also like to view...

Visualizations are splashes of color and geometric shapes that change with the music playing

Indicate whether the statement is true or false

Computer Science & Information Technology

This stage in the evolution of the modern IT infrastructure represented the original BYOD phenomenon.

A. Cloud and mobile computing B. Enterprise computing C. LANs (client/server computing) D. Stand-alone PCs

Computer Science & Information Technology