What is the technology that enables a user to authenticate to a company network from their assigned workstation and then be able to interact with resources throughout the private network without needing to enter additional credentials?
A. Single sign-on
B. CHAP
C. Multifactor authentication
D. AAA services
Answer: A. Single sign-on
You might also like to view...
Which of the following classes enable input and output of entire objects to or from a file?
A. SerializedInputStream B. SerializedOutputStream C. ObjectInputStream D. ObjectOutputStream E. Scanner F. Formatter a. A and B. b. C and D. c. C, D, E, F. d. E and F.
The assessment of the amount of risk an organization is willing to accept for a particular information asset is known as risk __________.
Fill in the blank(s) with the appropriate word(s).
With the ____________________ encoding scheme, to transmit a 1, the signal changes from low to high in the middle of the interval; to transmit a 0, the signal changes from high to low in the middle of the interval.?
Fill in the blank(s) with the appropriate word(s).
A virus _____ is a unique string of characters that match up to the code of a known virus.
A. definition B. message C. thread D. spike