Which of the following authentication methods uses public and private keys to secure communication and ensure the senders identity?
A. CHAP
B. EAP
C. PKI
D. Kerberos
Answer: C. PKI
You might also like to view...
Directory’s method GetDirectories returns:
a) a string of all the names of sibling directories b) an array of strings of all the names of sibling directories c) a string of all the names of subdirectories d) an array of strings of all the names of subdirectories
Which of the following represents how to specify Basic authentication in the .htaccess file?
a. AuthType Basic b. AuthName Basic c. AuthBasicProvider true d. ErrorDocument true
A 3-D reference is a reference to the same cell or range in multiple worksheets that you use in a formula.
Answer the following statement true (T) or false (F)
What statement regarding the use of linked clones within VMware Workstation 12 Pro is not accurate?
A. Changes made to each of the linked clones are stored within the template VM's virtual disk files. B. A linked clone takes up less disk space than a full clone. C. A linked clone shares the base virtual machine files with the parent or snapshot. D. Multiple linked clones can be based on a single parent.