Which current authentication method is typically used over a LAN?

A. CHAP
B. Kerberos
C. MS-CHAP
D. PAP


Answer: B

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. You can store a variety of data types in an array. 2. Arrays are reference type objects. 3. The ref keyword creates an object in memory and returns a reference to the object it creates. 4. An array's size declarator must be a non negative integer value. 5. The first element in an array is assigned subscript 1, the second element is assigned subscript 2, and so on.

Computer Science & Information Technology

In database terminology, a link between two tables is called a(n) ____.

A. active join B. relationship C. import D. export

Computer Science & Information Technology

What is the purpose of this command, and from what prompt is this command issued?

network 10.0.0.0 What will be an ideal response?

Computer Science & Information Technology

What is the name of the value assigned to a routing protocol to indicate its reliability compared with other routing protocols that might be in use on the same router?

A. metric B. administrative distance C. hop count D. ACL

Computer Science & Information Technology