Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure protocol, which can utilize EAP. Which of the following would BEST fit her objective?

A. CHAP
B. SAML
C. Kerberos
D. Diameter


Answer: D. Diameter

Computer Science & Information Technology

You might also like to view...

The debugger command _____________ sets a breakpoint at an executable line of source code in an application.

a) stop b) run c) print d) clear

Computer Science & Information Technology

The way in which a movie moves from one clip to another is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

An operator symbol can be used to produce any operation, whether or not the operation is consistent with the symbol's accepted use.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Outlook offers three message formats: HTML, Plain Text, and Rich Text.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology