LDAP and Kerberos are commonly used for which of the following?

A. To perform queries on a directory service
B. To store usernames and passwords for Federated Identity
C. To sign SSL wildcard certificates for subdomains
D. To utilize single sign-on capabilities


Answer: D. To utilize single sign-on capabilities

Computer Science & Information Technology

You might also like to view...

Keys are often used in linked lists because:

A. without a software key, a linked list is locked to all clients and, therefore, rendered unusable B. the values of the keys need to be duplicated in many of the nodes C. we often need to search for nodes of interest, and we find that node by looking for some particular value in the node, usually a key D. then, the client does not need to pass in a key as a parameter

Computer Science & Information Technology

Programmers can work on separate modules for efficiency without having to worry about variable names used in other modules.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You use a port scanner to scan a system and find port 80 open. What type of service is most likely running on that system?

a. FTP server b. Web server c. DNS server d. Telnet server

Computer Science & Information Technology

Describe the Exterior Gateway Protocol.

What will be an ideal response?

Computer Science & Information Technology