Which of the following authentication methods uses public and private keys to secure communication and ensure the senders identity?

A. CHAP
B. EAP
C. PKI
D. Kerberos


Answer: C. PKI

Computer Science & Information Technology

You might also like to view...

Directory’s method GetDirectories returns:

a) a string of all the names of sibling directories b) an array of strings of all the names of sibling directories c) a string of all the names of subdirectories d) an array of strings of all the names of subdirectories

Computer Science & Information Technology

Which of the following represents how to specify Basic authentication in the .htaccess file?

a. AuthType Basic b. AuthName Basic c. AuthBasicProvider true d. ErrorDocument true

Computer Science & Information Technology

A 3-D reference is a reference to the same cell or range in multiple worksheets that you use in a formula.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What statement regarding the use of linked clones within VMware Workstation 12 Pro is not accurate?

A. Changes made to each of the linked clones are stored within the template VM's virtual disk files. B. A linked clone takes up less disk space than a full clone. C. A linked clone shares the base virtual machine files with the parent or snapshot. D. Multiple linked clones can be based on a single parent.

Computer Science & Information Technology