A technician has deployed a new VPN concentrator. The device needs to authenticate users based on a backend directory service. Which of the following services could be run on the VPN concentrator to perform this authentication?
A. Kerberos
B. RADIUS
C. GRE
D. IPSec
Answer: B. RADIUS
You might also like to view...
Derive a class named Boots from the base class created in number 9 above.
What will be an ideal response?
____ is the term used to describe the connection that occurs between a Web site and a site visitor through actions such as clicking a button.
A. Behavior B. Interactivity C. Transition D. Movement
Match each item with a statement below.
A. Involves taking data and coding it into a different, unreadable form B. A single key is used to encrypt and decrypt the data C. The process to change something easy to read into something that is difficult to read D. Involves taking encrypted information and putting it back into the original form E. Two keys are used to encrypt and decrypt the data
Briefly discuss what block allocation is and how it is organized.
What will be an ideal response?