Which of the following authentication mechanisms on a wireless network uses a separate network authentication server?

A. Kerberos
B. TKIP
C. RADIUS
D. WEP


Answer: C. RADIUS

Computer Science & Information Technology

You might also like to view...

Before you can generate random numbers in Visual Basic, you first need to create a ________.

A. Random object B. Random container C. Random control D. Random string

Computer Science & Information Technology

The operation of adding a new structure to a dynamically linked list is called a(n) ____.

A. PUSH B. ENQUEUE C. INSERT D. ADD

Computer Science & Information Technology

You can apply artistic effects to a picture used as a slide's background.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____ threat permits unauthorized data disclosure.

A. ?secrecy B. ?integrity C. ?necessity D. ?none of the above

Computer Science & Information Technology