A network security engineer would like to allow authorized groups to access network devices with a shell restricted to only show information while still authenticating the administrator’s group to an unrestricted shell.
Which of the following can be configured to authenticate and enforce these shell restrictions? (Select TWO).
A . Single Sign On
B . Active Directory
C . Kerberos
D . NIS+
E . RADIUS
F . TACACS+
Answer: E,F