To counter an unauthorized access attempt, the following options can be utilized:
-
CHAP (Challenge Handshake Authentication Protocol) - This is an authentication protocol that provides a way to ensure that the user is who they claim to be by using a challenge-response mechanism.
-
Access Lists - Access lists can be used to control which users or devices can access certain resources, helping to prevent unauthorized access.
While TACACS (Terminal Access Controller Access-Control System) is another protocol used for network access control and authentication, and encrypted data can protect data in transit, the most specific choices for countering unauthorized access attempts in the context given are CHAP and Access Lists.
So, the correct answers are:
- CHAP
- Access Lists