Jane, a security administrator, has been tasked with explaining authentication services to the
company’s management team. The company runs an active directory infrastructure. Which
of the following solutions BEST relates to the host authentication protocol within the
company’s environment?
A.
Kerberos
B.
Least privilege
C.
TACACS+
D.
LDAP