Certified Information Systems Security Professional (CISSP) Practice Exam

Question: 1 / 1980

Which of the following is a feature of TACACS?

A protocol used solely for database access

A method primarily used for network equipment authentication

The focus of TACACS (Terminal Access Controller Access-Control System) is indeed on the authentication of users attempting to access network equipment. This protocol is widely adopted within network environments to secure access to routers, switches, and other network devices. It provides centralized authentication services, enabling administrators to manage user credentials and permissions effectively across multiple devices.

By supporting extensible control over authentication mechanisms, TACACS can provide secure access while allowing for detailed accounting and authorization procedures. Its versatility and effectiveness in managing network equipment authentication make it a key feature in maintaining network security.

In contrast, the other options do not align with the core functionality of TACACS. It is not designed solely for database access, email security, or limited to local authentication, which further highlights its primary role in the realm of network equipment management.

Get further explanation with Examzify DeepDiveBeta

A method for managing email security

A protocol that only supports local authentication

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy