The ____ in an 802.1x configuration stores the list of the names and credentials of authorized users to verify their authenticity.

A. supplicant
B. authenticator
C. authentication server
D. RADIUS


Answer: C

Computer Science & Information Technology

You might also like to view...

If a document is ________ protected, the file is restricted to anyone who does not have the log in credentials

A) read-only B) modification C) password D) virus

Computer Science & Information Technology

In the Object Relational Model (ORM) an object-type has a name, attributes, and methods.

a) What is a method? And what is the principal use of methods? b) What kinds of methods are supported by Oracle ORM.

Computer Science & Information Technology

When you link two files, changes in the source file are not automatically incorporated in the destination file

Indicate whether the statement is true or false

Computer Science & Information Technology

A common error associated with defining and processing strings is forgetting to include the ____________________ header file when using string class objects.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology