Which of the following was based on a previous X.500 specification and allows either unencrypted authentication or encrypted authentication through the use of TLS?

A. Kerberos
B. TACACS+
C. RADIUS
D. LDAP


Answer: D. LDAP

Computer Science & Information Technology

You might also like to view...

What is the recommended starting TTL value?

A. 64 B. 72 C. 112 D. 128

Computer Science & Information Technology

Like object-oriented programs, procedural programs are data centered.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When hashing a message, which of the following security goals is being provided?

A. Integrity B. Confidentiality C. Encryption D. Availability

Computer Science & Information Technology

A(n) ____________________ is the design document for your site.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology