Your company's network uses cisco equipment. You don’t want to have to individually configure the username and password within the configuration of each device. You also want to ensure that all of the information sent for authentication is encrypted. Which protocol should you use?

  • RADIUS
  • EAP
  • TACACS+
  • Kerberos

Your Score:
Attacks, Threats, and Vulnerabilities
Architecture and Design
Implementation
Operations and Incident Response
Governance, Risk, and Compliance
CompTIA Security+ SY0-601
  • Attacks, Threats, and Vulnerabilities
  • Architecture and Design
  • Implementation
    • This question is filed here
  • Operations and Incident Response
  • Governance, Risk, and Compliance