A technician is troubleshooting authentication issues on a server. It turns out the clock on the server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario, which of the following authentication methods was being used?
A. Kerberos
B. CHAP
C. TACACS+
D. RADIUS
Answer: A. Kerberos
Computer Science & Information Technology
You might also like to view...
The DisplayPort port can be used for video but also provide power for up to seven devices
Indicate whether the statement is true or false
Computer Science & Information Technology
A ____________________ mode VPN establishes two perimeter tunnel servers to encrypt all traffic that will traverse an unsecured network. The entire client packet is encrypted and added as the data portion of a packet addressed from one tunneling server to another.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology