Which Windows domain-based protocol provides mutual authentication between devices?

a. Eap
b. Tacacs+
c. Radius
d. Kerberos


Ans: d. Kerberos

Computer Science & Information Technology

You might also like to view...

MIDI files contain a set of instructions for synthesizing music which are called MIDI ____.

A. addresses B. e-mails C. sound bytes D. messages

Computer Science & Information Technology

An entity that describes attributes such as repeating groups is called:

A) a fundamental entity. B) an associative entity. C) an attributive entity. D) an external entity.

Computer Science & Information Technology

Write a C++ program that uses the statements to calculate x raised to the y power. The program should have a while iteration statement.

``` // Exercise 4.8 Solution: power.cpp // Raise x to the y power. #include using namespace std; int main() { unsigned int i{1}; // initialize i to begin counting from 1 unsigned int power{1}; // initialize power cout << "Enter base as an integer: "; // prompt for base unsigned int x; // base cin >> x; // input base cout << "Enter exponent as an integer: "; // prompt for exponent unsigned int y; // exponent cin >> y; // input exponent // count from 1 to y and multiply power by x each time while (i <= y) { power *= x; ++i; } // end while cout << power << endl; // display result } // end main ```

Computer Science & Information Technology

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

A. denial of service (DoS) B. zombie C. logic bomb D. rootkit

Computer Science & Information Technology