ISC Exam Questions

Which of the following authentication methods prevents unauthorized execution of code on remote syst

Which of the following authentication methods prevents unauthorized execution of code on remote
systems?

A.
TACACS

B.
S-RPC

C.
RADIUS

D.
CHAP