Select the authentication system developed by the Massachusetts Institute of Technology (MIT) to verify the identity of network users.

A. Aurora
B. Kerberos
C. CHAP
D. TACACS


Answer: B

Computer Science & Information Technology

You might also like to view...

When buying a monitor, which factor is NOT important to consider?

a. screen resolution b. viewing angle c. color depth d. aspect ratio

Computer Science & Information Technology

Which of the following is accomplished via a new version of DHCP known as DHCPv6?

A. Stateless address autoconfiguration B. Stateful address autoconfiguration C. Aware address autoconfiguration D. Awareless address autoconfiguration

Computer Science & Information Technology

Explain the following terms for a reader who is not familiar with Excel:

What will be an ideal response?

Computer Science & Information Technology

One practical method to lower frustration that arises when reassembling the computer is

A) Know where the traces on the motherboard lead. B) Document as you disassemble the computer. C) Meditate before disassembling and reassembling. D) Always have the correct tool on hand.

Computer Science & Information Technology