What is used to prevent users to connecting to Remote Desktop until the connection is authenticated?

A. Windows Firewall
B. Remote Desktop Authentication
C. Network Level Authentication
D. IPsec Authentication


Answer: C

Computer Science & Information Technology

You might also like to view...

iCloud is a remote location for storage of data to be retrieved, saved, shared, and/or forwarded

Indicate whether the statement is true or false

Computer Science & Information Technology

Thrashing is a problem that occurs when there are a large number of jobs and many free pages so that pages are being moved around too much.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In a FP (Floating Point) pipeline, the possibiltiy of having multiple instructions attempting to write on the same clock cycle can occur.

Indicate whether the statement is true or false.

Computer Science & Information Technology

An organization that wishes to implement additional deterrent controls should consider:

a. An intrusion alarm system b. A key card entry control system c. “No Trespassing” signs d. Fencing

Computer Science & Information Technology