Chapter 6. Authentication
This chapter covers the following subjects:
The identification and verification of users requesting access to a device or network is one of the core objectives of security. Although several methods of authentication are available, it is essential that one or a combination of authentication methods be used to secure the device or network. This chapter covers the different types of authentication methods that you can use for Cisco devices and networks.
“Do I Know This Already?” Quiz
The purpose of the “Do I Know This Already?” quiz is to help you decide whether you really need to read the entire chapter. If you already intend to read the entire chapter, you do not necessarily ...
Get CCSP Self-Study: CCSP SNRS Exam Certification Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.