Which of the following authentication mechanisms on a wireless network uses a separate network authentication server?
A. Kerberos
B. TKIP
C. RADIUS
D. WEP
Answer: C. RADIUS
Computer Science & Information Technology
You might also like to view...
Before you can generate random numbers in Visual Basic, you first need to create a ________.
A. Random object B. Random container C. Random control D. Random string
Computer Science & Information Technology
The operation of adding a new structure to a dynamically linked list is called a(n) ____.
A. PUSH B. ENQUEUE C. INSERT D. ADD
Computer Science & Information Technology
You can apply artistic effects to a picture used as a slide's background.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A(n) ____ threat permits unauthorized data disclosure.
A. ?secrecy B. ?integrity C. ?necessity D. ?none of the above
Computer Science & Information Technology