Which of the following can be configured to authenticate and enforce these shell restrictions?

Posted by: Pdfprep Category: CAS-001 Tags: , ,

A network security engineer would like to allow authorized groups to access network devices with a shell restricted to only show information while still authenticating the administrator’s group to an unrestricted shell.

Which of the following can be configured to authenticate and enforce these shell restrictions? (Select TWO).
A . Single Sign On
B . Active Directory
C . Kerberos
D . NIS+
E . RADIUS
F . TACACS+

Answer: E,F

Leave a Reply

Your email address will not be published.