A network architect is designing a solution with HP products. A customer has the following
requirements for controlling the management access for administrators:
Administrators are assignedprivileges whenthey loginbased on their identity.
Security policies related topasswordcompatibility and passwordrotation, likethe
company’swindows domain policies, areenforced foradministrator credentials
The company can easily resolvethe access of administratorswho leave the company
Administrators have a backdoorinto the management interfacein case network connectivityfails
in any way.
Which options meets the company’s requirements?
A.
Authentication with a password that meets the complexity requirements and is stored locally on
each device.
B.
Authentication to RADIUS server with local authentication as a secondary method.
C.
Authentication to local user accounts with TACACS+ authentication as a secondary method.
D.
Authentication to a TACACS+ server.