A security analyst is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation. Given these requirements, which of the following technologies should the analyst recommend and configure?
A. LDAP services
B. Kerberos services
C. NTLM services
D. CHAP services
Answer: B. Kerberos services
Computer Science & Information Technology
You might also like to view...
A function-message must be sent from a place where a(n) ____ can appear.
A. property B. control C. value D. object
Computer Science & Information Technology
How many bytes of memory are used in MS Visual C++ for the datatype float ?
A. 1 B. 4 C. 8 D. 2
Computer Science & Information Technology
All functions begin with a plus sign
Indicate whether the statement is true or false
Computer Science & Information Technology
To insert text from another source on a Web page, first open the file in its native program and copy the text to the Clipboard.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology