Which of the following would allow a network administrator to implement a user authentication method that uses X.509 certificates?
A. PKI
B. Kerberos
C. TACACS+
D. RADIUS
Which of the following would allow a network administrator to implement a user authentication method that uses X.509 certificates?
A. PKI
B. Kerberos
C. TACACS+
D. RADIUS