Which of the following was based on a previous X.500 specification and allows either unencrypted authentication or encrypted authentication through the use of TLS?
A. Kerberos
B. TACACS+
C. RADIUS
D. LDAP
Answer: D. LDAP
Computer Science & Information Technology
You might also like to view...
What is the recommended starting TTL value?
A. 64 B. 72 C. 112 D. 128
Computer Science & Information Technology
Like object-oriented programs, procedural programs are data centered.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When hashing a message, which of the following security goals is being provided?
A. Integrity B. Confidentiality C. Encryption D. Availability
Computer Science & Information Technology
A(n) ____________________ is the design document for your site.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology