This authentication protocol is used in a TCP/IP network where many clients all connect to a single authenticating server with no point-to-point involved.

A. MS-CHAP
B. TACACS+
C. PPP
D. Kerberos


Answer: D

Computer Science & Information Technology

You might also like to view...

Who are the founders of Microsoft?

a. Paul Allen and Bill Gates b. Steve Jobs and Steve Wozniak c. Steve Jobs and Bill Gates d. Bill Gates and Steve Wozniak

Computer Science & Information Technology

List three reasons for creating a logical data flow diagram.

What will be an ideal response?

Computer Science & Information Technology

In the accompanying figure, item D is used to set the _______________ folio orientation.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Information processing is a vital activity today because the success of many businesses depends heavily on the wise use of information.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology