Lin, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement?
Network Architecture | |
Network operations | |
Network security | |
Troubleshooting | |
Industry standards, practices, and network theory |