– Compare and contrast the different uses of authentication protocols (e.g. LANMAN, Local authentication, Kerberos, RADIUS, TACAS, etc.) and directory services (e.g. LDAP, etc.) and their weaknesses.
Please DO NOT USE outside sources or quote your book directly for these discussions – summarize what you want to say in your own words and use examples to illustrate your meaning.x