Which of the following authentication methods can use the SCTP and TLS protocols for reliable packet transmissions?
A. TACACS+
B. SAML
C. Diameter
D. Kerberos
Answer: C. Diameter
Computer Science & Information Technology
You might also like to view...
You use the Report Header to create the ________ of a report
Fill in the blank(s) with correct word
Computer Science & Information Technology
The ________ function can be used to perform a multiconditional average of data
A) AVERAGEIF B) AVERAGEIFS C) MU D) AVERAGE
Computer Science & Information Technology
One of two commonly used style guides for formatting research papers.
What will be an ideal response?
Computer Science & Information Technology
The first two versions of SNMP, SNMPv1 and SNMPv2, used ____ that acted like a password to allow or deny access to the information that was collected.
A. community strings B. management information base (MIB) C. packet sniffers D. flash memories
Computer Science & Information Technology