Which of the following technologies is not a true protocol, but enables the use of different authentication methods?
A. EAP
B. 802.1X
C. PPP
D. IPsec
Answer: A
Computer Science & Information Technology
You might also like to view...
A(n) ________ is a set of commands and instructions that can be grouped as a single command to accomplish a task automatically
Fill in the blank(s) with correct word
Computer Science & Information Technology
You can format the Entry table in the Network Diagram dialog box.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the following is a bibliographic source?
A. map B. memo C. letter D. all of the above
Computer Science & Information Technology
A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network.
a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub
Computer Science & Information Technology