Which of the following can be used to control specific commands that can be executed on a network
infrastructure device?
A. LDAP
B. Kerberos
C. SAML
D. TACACS+
Which of the following can be used to control specific commands that can be executed on a network
infrastructure device?
A. LDAP
B. Kerberos
C. SAML
D. TACACS+