1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BartSMP [9]
3 years ago
15

Multiple client switches and routers have been set up at a small military base. the network team decided to implement terminal a

ccess controller access-control system plus (tacacs+), along with kerberos, and an external lightweight directory access protocol (ldap) service. what is the primary reason tacacs+ was chosen for this?
a. device administration
b. system administrative
c. both a & b
d. none of these
Computers and Technology
1 answer:
Mars2501 [29]3 years ago
5 0

Answer:

A. Device Administration

Explanation:

Terminal access controller access control system (TACACS) is an authentication protocol used for remote communication with any server housed in a UNIX network. TACACS provides an easy method of determining user network access via remote authentication server communication. The TACACS protocol uses port 49 by default.

TACACS uses allow/deny mechanisms with authentication keys that correspond with usernames and passwords. Cisco, which designed and launched the TACACS protocol, is also its owner.

You might be interested in
Jack is part of the software quality assurance team in a company. Which activity should Jack perform as a part of software quali
gizmo_the_mogwai [7]

Answer:

C - testing

Explanation:

quality assurance is another name for verifying something. so when you verify software, you test the software.

3 0
3 years ago
7d2b:00a9:a0c4:0000:a772:00fd:a523:0358
motikmotik

Answer:

yh3iuskjldnsjfhbcgfihekwfhei3wh8hfefbgp

Explanation:

6 0
3 years ago
What is a common indicator of a phishing attempt cyber awareness 2022
vivado [14]

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

  • Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

brainly.com/question/24069038

7 0
3 years ago
Mention the usage of crop concept in ms-word​
nignag [31]

Answer:

Every image editing software has a crop tool that allows you to trim or eliminate the edges of an image. Cropping tools in Ms.word allow you to hide portions of picture that you do not want to be displayed in the final result.

3 0
3 years ago
Read 2 more answers
Which graph or chart shows changes in the value of data?
yKpoI14uk [10]

Answer:

Bar graph and Pie chart

3 0
3 years ago
Read 2 more answers
Other questions:
  • What is the curriculum of digital literacy
    6·1 answer
  • Currently, there are two major techniques used to develop programs and their procedures. name and describe them. html editor key
    11·1 answer
  • What is the other alternative keyboard to the qwerty?
    10·2 answers
  • 3. By eliminating data redundancy, you're enforcing data A. validation. B. integrity. C. consistency. D. accuracy.
    14·2 answers
  • Which method of traversing a tree would result in a sorted list for a binary search tree?
    11·1 answer
  • 2.<br> The force of impact is
    5·1 answer
  • Why do ineed to upgrade to see answers isnt it enough adds
    15·2 answers
  • Another word for Arithmetic Logic Unit​
    6·1 answer
  • Discuss advantages and disadvantages of operating system
    8·2 answers
  • Anyone on ps4 willing to trade me a fennec or McClaren on rocket league?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!