A company wants to make sure that users are required to authenticate prior to being allowed on the network. Which of the following is the BEST way to accomplish this?
A. 802.1x
B. 802.1p
C. Single sign-on
D. Kerberos
Answer: A. 802.1x
Computer Science & Information Technology
You might also like to view...
A(n) ________ chart has an appearance with height, width, and depth
Fill in the blank(s) with correct word
Computer Science & Information Technology
The ________ is used to change the size of the placeholder
Fill in the blank(s) with correct word
Computer Science & Information Technology
What are the implications for digital certificate authentication if the true party's private key is stolen?
Computer Science & Information Technology
Which of the following Windows features would be used to encrypt a single file or folder?
A. FES B. EFS C. NTFS D. Encryption
Computer Science & Information Technology