Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure protocol, which can utilize EAP. Which of the following would BEST fit her objective?
A. CHAP
B. SAML
C. Kerberos
D. Diameter
Answer: D. Diameter
Computer Science & Information Technology
You might also like to view...
The debugger command _____________ sets a breakpoint at an executable line of source code in an application.
a) stop b) run c) print d) clear
Computer Science & Information Technology
The way in which a movie moves from one clip to another is called a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
An operator symbol can be used to produce any operation, whether or not the operation is consistent with the symbol's accepted use.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Outlook offers three message formats: HTML, Plain Text, and Rich Text.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology