A security administrator has been tasked to ensure access to all network equipment is controlled by a central
server such as TACACS+.
Which of the following risk mitigation strategies supports this type of implementation?
User rights and permissions review
Data loss prevention
Implement procedures to prevent data theft
Terminal Access Controller Access-Control System (TACACS, and variations like XTACACS and TACACS+) is
a client/server-oriented environment, and it operates in a manner similar to RADIUS. Furthermore, TACACS+
allows for credential to be accepted from multiple methods. Thus, you can perform user rights and permission
reviews with TACACS+.