A company wants to make sure that users are required to authenticate prior to being allowed on the network. Which of the following is the BEST way to accomplish this?

A. 802.1x
B. 802.1p
C. Single sign-on
D. Kerberos


Answer: A. 802.1x

Computer Science & Information Technology

You might also like to view...

A(n) ________ chart has an appearance with height, width, and depth

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ________ is used to change the size of the placeholder

Fill in the blank(s) with correct word

Computer Science & Information Technology

What are the implications for digital certificate authentication if the true party's private key is stolen?

Computer Science & Information Technology

Which of the following Windows features would be used to encrypt a single file or folder?

A. FES B. EFS C. NTFS D. Encryption

Computer Science & Information Technology