Jane, a security administrator, has been tasked with explaining authentication services to the
company’s management team. The company runs an active directory infrastructure. Which of the
following solutions BEST relates to the host authentication protocol within the company’s
environment?
A.
Kerberos
B.
Least privilege
C.
TACACS+
D.
LDAP
Explanation:
Kerberos was accepted by Microsoft as the chosen authentication protocol for Windows 2000 and
Active Directory domains that followed.