A technician is troubleshooting authentication issues on a server. It turns out the clock on the server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario, which of the following authentication methods was being used?

A. Kerberos
B. CHAP
C. TACACS+
D. RADIUS

Answer: A. Kerberos

Computer Science & Information Technology

You might also like to view...

The DisplayPort port can be used for video but also provide power for up to seven devices

Indicate whether the statement is true or false

Computer Science & Information Technology

A ____________________ mode VPN establishes two perimeter tunnel servers to encrypt all traffic that will traverse an unsecured network. The entire client packet is encrypted and added as the data portion of a packet addressed from one tunneling server to another.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology