Question 472 pts

Which of the following can be used to counter an unauthorized access attempt? (Choose two.)
Group of answer choices

CHAP

Encrypted data

Access Lists

TACACS

1 answer

To counter an unauthorized access attempt, the following options can be utilized:

  1. CHAP (Challenge Handshake Authentication Protocol) - This is an authentication protocol that provides a way to ensure that the user is who they claim to be by using a challenge-response mechanism.

  2. Access Lists - Access lists can be used to control which users or devices can access certain resources, helping to prevent unauthorized access.

While TACACS (Terminal Access Controller Access-Control System) is another protocol used for network access control and authentication, and encrypted data can protect data in transit, the most specific choices for countering unauthorized access attempts in the context given are CHAP and Access Lists.

So, the correct answers are:

  • CHAP
  • Access Lists