Which of the following authentication methods prevents unauthorized execution of code on remote systems?

Which of the following authentication methods prevents unauthorized execution of code on remote systems?
A . TACACS
B . S-RPC
C . RADIUS
D . CHAP

Answer: B

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments