A technician has deployed a new VPN concentrator. The device needs to authenticate users based on a backend directory service. Which of the following services could be run on the VPN concentrator to perform this authentication?

A. Kerberos
B. RADIUS
C. GRE
D. IPSec


Answer: B. RADIUS

Computer Science & Information Technology

You might also like to view...

Derive a class named Boots from the base class created in number 9 above.

What will be an ideal response?

Computer Science & Information Technology

____ is the term used to describe the connection that occurs between a Web site and a site visitor through actions such as clicking a button.

A. Behavior B. Interactivity C. Transition D. Movement

Computer Science & Information Technology

Match each item with a statement below.

A. Involves taking data and coding it into a different, unreadable form B. A single key is used to encrypt and decrypt the data C. The process to change something easy to read into something that is difficult to read D. Involves taking encrypted information and putting it back into the original form E. Two keys are used to encrypt and decrypt the data

Computer Science & Information Technology

Briefly discuss what block allocation is and how it is organized.

What will be an ideal response?

Computer Science & Information Technology