Which of the following combines authentication and authorization, and does not use the TCP protocol?

A. RADIUS
B. Kerberos
C. LDAP
D. TACACS+


Answer: A. RADIUS

Computer Science & Information Technology

You might also like to view...

If you have a class defined in separate files, and change the way a member function is defined (the body of the function), which files need to be re-compiled?

a. The interface b. The application c. The Implementation d. All files e. B and C

Computer Science & Information Technology

Smart cards can be used for a variety of purposes, including storing a user's financial facts, health insurance data, credit card numbers, and network identification codes and passwords.  They can also store monetary values for spending.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Use du to examine your disk usage. Write a script that prints out the full pathnames of your files that are over a specified size.

What will be an ideal response?

Computer Science & Information Technology

Problem solving, critical thinking, and decision making are different names for the same skill.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology