What standard provides a greater degree of security by implementing port-based authentication and blocks all traffic on a port-by-port basis until the client is authenticated using credentials stored on an authentication server?
A. IEEE 802.1a
B. IEEE 802.1x
C. LDAPS
D. TACACS
Answer: B
You might also like to view...
A computer forensics examiner is about to conduct a forensics examination of a computer’s hard drive and anticipates that he will be cross-examined in a deposition. What should the examiner do to ensure that the image he takes of the computer’s hard drive is an exact copy of the hard drive?
a. Reconcile the numbers of files and directories on the original and copied image b. Perform SHA-1 and MD5 checksums of the original drive and the copied image c. Use a write blocker when making a copy of the original drive d. Make a copy of the hard drive and perform forensics on the original
Which position is not a part of the systems development department?
a. systems analyst c. programmer b. project manager d. database administrator
Which of the following is NOT controlled by choosing a chart style?
A) Sparklines B) Data series C) Color of the chart area D) Plot area
Both solar-powered and hand-powered chargers are available for use with portable computers, mobile phones, and other small portable devices. _________________________
Answer the following statement true (T) or false (F)