What is the name of the protocol that defines a set of common functions that actual authentication methods can use to authenticate users?

A) Expanded Authentication Protocol
B) Wireless Security Protocol
C) Extensible Authentication Protocol
D) Multi-security Protocol


Answer: C) Extensible Authentication Protocol

Computer Science & Information Technology

You might also like to view...

Which Cisco IOS method would be used to configure AAA authentication using a device's user database?

A) local B) login C) database D) username

Computer Science & Information Technology

Promiscuous mode guarantees that the network adapter will capture all the network traffic on the LAN.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Name the point(s) that are on the positive x-axis.

A. D B. F C. C D. A E. E F. H G. G H. B

Computer Science & Information Technology

Which part of a well-designed cryptographic system is responsible for maintaining the secrecy of communications?

a. Identity of sender b. Algorithm c. Key d. Time of use

Computer Science & Information Technology