Which of the following technologies is not a true protocol, but enables the use of different authentication methods?

A. EAP
B. 802.1X
C. PPP
D. IPsec


Answer: A

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a set of commands and instructions that can be grouped as a single command to accomplish a task automatically

Fill in the blank(s) with correct word

Computer Science & Information Technology

You can format the Entry table in the Network Diagram dialog box.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is a bibliographic source?

A. map B. memo C. letter D. all of the above

Computer Science & Information Technology

A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network.

a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub

Computer Science & Information Technology