Sally has been tasked with deploying an authentication, authorization, and accounting server for wireless network services in her organization and needs to avoid using proprietary technology. What technology should she select?
A. OAuth
B. RADIUS
C. XTACACS
D. TACACS+
Answer: B. RADIUS
Computer Science & Information Technology
You might also like to view...
A systematic procedure for starting at the first node in a list, and visiting all nodes in the list by going from each node to its successor is called
A) a sweep B) a traversal C) travelling over the list D) All of the above
Computer Science & Information Technology
Computers store files on _______, such as magnetic disks.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The gradient fill box on the Options bar is also called Click to edit the gradient box.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
In arithmetic statements, the rules of precedence can be overridden using parentheses.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology