ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 28 - CISSP-ISSAP discussion

Report
Export

Which of the following authentication methods prevents unauthorized execution of code on remote systems?

A.
TACACS
Answers
A.
TACACS
B.
S-RPC
Answers
B.
S-RPC
C.
RADIUS
Answers
C.
RADIUS
D.
CHAP
Answers
D.
CHAP
Suggested answer: B
asked 18/09/2024
Arkadiusz Skopinski
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first