Site icon Exam4Training

Which of the following authentication methods prevents unauthorized execution of code on remote systems?

Which of the following authentication methods prevents unauthorized execution of code on remote systems?
A . TACACS
B . S-RPC
C . RADIUS
D . CHAP

Answer: B

Exit mobile version