List of questions
Related questions
Question 28 - CISSP-ISSAP discussion
Which of the following authentication methods prevents unauthorized execution of code on remote systems?
A.
TACACS
B.
S-RPC
C.
RADIUS
D.
CHAP
Your answer:
0 comments
Sorted by
Leave a comment first