PdfPrep.com

Which of the following can be configured to authenticate and enforce these shell restrictions?

A network security engineer would like to allow authorized groups to access network devices with a shell restricted to only show information while still authenticating the administrator’s group to an unrestricted shell.

Which of the following can be configured to authenticate and enforce these shell restrictions? (Select TWO).
A . Single Sign On
B . Active Directory
C . Kerberos
D . NIS+
E . RADIUS
F . TACACS+

Answer: E,F

Exit mobile version