Which of the following authentication methods can use the SCTP and TLS protocols for reliable packet transmissions?

A. TACACS+
B. SAML
C. Diameter
D. Kerberos


Answer: C. Diameter

Computer Science & Information Technology

You might also like to view...

You use the Report Header to create the ________ of a report

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ________ function can be used to perform a multiconditional average of data

A) AVERAGEIF B) AVERAGEIFS C) MU D) AVERAGE

Computer Science & Information Technology

One of two commonly used style guides for formatting research papers.

What will be an ideal response?

Computer Science & Information Technology

The first two versions of SNMP, SNMPv1 and SNMPv2, used ____ that acted like a password to allow or deny access to the information that was collected.

A. community strings B. management information base (MIB) C. packet sniffers D. flash memories

Computer Science & Information Technology