A security analyst is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation. Given these requirements, which of the following technologies should the analyst recommend and configure?

A. LDAP services
B. Kerberos services
C. NTLM services
D. CHAP services


Answer: B. Kerberos services

Computer Science & Information Technology

You might also like to view...

A function-message must be sent from a place where a(n) ____ can appear.

A. property B. control C. value D. object

Computer Science & Information Technology

How many bytes of memory are used in MS Visual C++ for the datatype float ?

A. 1 B. 4 C. 8 D. 2

Computer Science & Information Technology

All functions begin with a plus sign

Indicate whether the statement is true or false

Computer Science & Information Technology

To insert text from another source on a Web page, first open the file in its native program and copy the text to the Clipboard.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology