What is the maximum number of methods that a single method list can contain?

What is the maximum number of methods that a single method list can contain?
A. 4
B. 3
C. 2
D. 5

cisco-exams

5 thoughts on “What is the maximum number of methods that a single method list can contain?

  1. The correct is 5.

    AAA Authorization Methods
    AAA supports five different methods of authorization:

    TACACS+–The network access server exchanges authorization information with the TACACS+ security daemon. TACACS+ authorization defines specific rights for users by associating attribute-value pairs, which are stored in a database on the TACACS+ security server, with the appropriate user.
    If-Authenticated–The user is allowed to access the requested function provided the user has been authenticated successfully.
    None –The network access server does not request authorization information; authorization is not performed over this line/interface.
    Local–The router or access server consults its local database, as defined by the username command, for example, to authorize specific rights for users. Only a limited set of functions can be controlled through the local database.
    LDAP–The network access server requests authorization information from the RADIUS security server. LDAP authorization defines specific rights for users by associating attributes, which are stored in a database on the LDAP server, with the appropriate user.
    RADIUS–The network access server requests authorization information from the RADIUS security server. RADIUS authorization defines specific rights for users by associating attributes, which are stored in a database on the RADIUS server, with the appropriate user.

  2. AAA supports five different methods of authorization:

    TACACS+—The network access server exchanges authorization information with the TACACS+ security daemon. TACACS+ authorization defines specific rights for users by associating attribute-value pairs, which are stored in a database on the TACACS+ security server, with the appropriate user.

    If-Authenticated—The user is allowed to access the requested function provided the user has been authenticated successfully.

    None—The network access server does not request authorization information; authorization is not performed over this line/interface.

    Local—The router or access server consults its local database, as defined by the username command, for example, to authorize specific rights for users. Only a limited set of functions can be controlled via the local database.

    RADIUS—The network access server requests authorization information from the RADIUS security server. RADIUS authorization defines specific rights for users by associating attributes, which are stored in a database on the RADIUS server, with the appropriate user.

  3. Correct answer is A because of Cisco sec Book

    At least one method must be specified. To use the local user
    database, use the local keyword. A single list can contain up to four
    methods, which are tried in order, from left to right.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.