Describe 802.1x authentication.

What will be an ideal response?


802.1x authentication involves three main participants: the supplicant, authenticator, and authentication server. The supplicant is the station that requests access through the authenticator, which is usually an AP in wireless networks. The authenticator passes the request to the authentication server, which stores the credentials of authorized users. An important strength of 802.1x is that the supplicant never communicates directly with the authentication server, thus reducing the chance of compromising sensitive data stored on the server.

Computer Science & Information Technology

You might also like to view...

Suppose

``` void nPrint(char ch, int n) { while (n > 0) { cout << ch; n--; } } ``` What is the printout of the call nPrint('a', 4)? A. invalid call B. aaaaa C. aaaa D. aaa

Computer Science & Information Technology

In a flowchart or in pseudocode, you can use the symbol that mathematicians use to mean "not equal," which is ____.

A. an equal sign with an octagon over it B. an equal sign with a circle around it C. an equal sign with a slash after it D. an equal sign with a slash through it

Computer Science & Information Technology

Which of the following is the keyword that should be listed after the hosts statement in the /etc/nsswitch.conf file so that the system will consult the /etc/hosts file to resolve a name to an IP address?

A. local B. files C. hosts D. etchosts

Computer Science & Information Technology

A 2-3 tree is a type of B-tree.

What will be an ideal response?

Computer Science & Information Technology