Which of the following authentication methods is MOST likely being attempted?
A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator
detects a device trying to communicate to TCP port 49. Which of the following authentication methods is
MOST likely being attempted?
Which of the following is an authentication and accounting service that uses TCP for connecting to routers and
Which of the following is an authentication and accounting service that uses TCP for connecting to
routers and switches?
which of the following risk mitigation strategies?
A security administrator has been tasked to ensure access to all network equipment is controlled by a
central server such as TACACS+. This type of implementation supports which of the following risk
mitigation strategies?
Which of the following services are used to support authentication services for several local devices from a c
Which of the following services are used to support authentication services for several local devices from
a central location without the use of tokens?
Which of the following protocols uses TCP instead of UDP and is incompatible with all previous versions?
Which of the following protocols uses TCP instead of UDP and is incompatible with all previous versions?
Which of the following authentication services should be replaced with a more secure alternative?
Which of the following authentication services should be replaced with a more secure alternative?
which of the following?
In Kerberos, the Ticket Granting Ticket (TGT) is used for which of the following?
Which of the following types of authentication packages user credentials in a ticket?
Which of the following types of authentication packages user credentials in a ticket?
Which of the following authentication services requires the use of a ticket-granting ticket (TGT) server in or
Which of the following authentication services requires the use of a ticket-granting ticket (TGT) server in
order to complete the authentication process?
Which of the following authentication protocols is the security administrator planning to implement across the
A security administrator has installed a new KDC for the corporate environment. Which of the following
authentication protocols is the security administrator planning to implement across the organization?