LDAP/Radius/TACACS+ are used for what in network access control?

Study for the Network Operations Test. Explore management, protocols, and backup strategies with comprehensive questions and detailed explanations. Prepare for success!

Multiple Choice

LDAP/Radius/TACACS+ are used for what in network access control?

Explanation:
These protocols are used for authentication, authorization, and accounting in network access control. They verify who a user or device is (authentication), determine what level of access they should have (authorization), and record what happened during the session (accounting). In practice, RADIUS and TACACS+ are designed for network access control: RADIUS is commonly used to authenticate users trying to access a network (for example, when connecting to Wi‑Fi or VPN) and to collect accounting data about those sessions; it can also convey authorization attributes that define what the user can access. TACACS+ serves a similar role but is often preferred for device administration because it encrypts the entire payload and supports granular admin permissions and accounting for admin actions. LDAP, while a directory service for storing user information, isn’t itself the primary protocol used for controlling network access in the same way AAA protocols are, and the other options don’t describe their core function. So, the best fit is that these protocols provide authentication, authorization, and accounting.

These protocols are used for authentication, authorization, and accounting in network access control. They verify who a user or device is (authentication), determine what level of access they should have (authorization), and record what happened during the session (accounting).

In practice, RADIUS and TACACS+ are designed for network access control: RADIUS is commonly used to authenticate users trying to access a network (for example, when connecting to Wi‑Fi or VPN) and to collect accounting data about those sessions; it can also convey authorization attributes that define what the user can access. TACACS+ serves a similar role but is often preferred for device administration because it encrypts the entire payload and supports granular admin permissions and accounting for admin actions. LDAP, while a directory service for storing user information, isn’t itself the primary protocol used for controlling network access in the same way AAA protocols are, and the other options don’t describe their core function.

So, the best fit is that these protocols provide authentication, authorization, and accounting.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy