The ____ authentication type is used for clients who access RAS through special devices such as smart cards, token cards, and others that use certificate authentication.
A. CHAP
B. PAP
C. SPAP
D. EAP
Answer: D
You might also like to view...
Explain the difference between a network IP address and a network prefix.
What will be an ideal response?
A ____ paragraph places the first character of a text line near the left border of a placeholder.
A. left-aligned B. right-line C. centered D. justified
The ____________________ exception type occurs when a value exceeds the size limit of its assigned data type.
Fill in the blank(s) with the appropriate word(s).
A network security engineer notices unusual traffic on the network from a single IP attempting to access systems on port 23. Port 23 is not used anywhere on the network. Which of the following should the engineer do to harden the network from this type of intrusion in the future?
A. Disable unnecessary services on servers B. Disable unused accounts on servers and network devices C. Implement password requirements on servers and network devices D. Enable auditing on event logs