Sally has been tasked with deploying an authentication, authorization, and accounting server for wireless network services in her organization and needs to avoid using proprietary technology. What technology should she select?

A. OAuth
B. RADIUS
C. XTACACS
D. TACACS+


Answer: B. RADIUS

Computer Science & Information Technology

You might also like to view...

A systematic procedure for starting at the first node in a list, and visiting all nodes in the list by going from each node to its successor is called

A) a sweep B) a traversal C) travelling over the list D) All of the above

Computer Science & Information Technology

Computers store files on _______, such as magnetic disks.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The gradient fill box on the Options bar is also called Click to edit the gradient box.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In arithmetic statements, the rules of precedence can be overridden using parentheses.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology