Which of the following is an authentication method that can be secured by using SSL?
A. RADIUS
B. LDAP
C. TACACS+
D. Kerberos
Answer: B. LDAP
Computer Science & Information Technology
You might also like to view...
Map method ________ is used to determine whether a map contains a mapping for the specified key.
a. containsKey b. hasKey c. containsMapping d. hasMapping
Computer Science & Information Technology
In a(n) ____-controlled loop, the continuation condition is tested at the top of the loop on each pass.
A. task B. entry C. count D. All of the above
Computer Science & Information Technology
Formats applied to images that make pictures resemble sketches or paintings are:
a. Artistic Effects b. Styles c. Picture Effects
Computer Science & Information Technology
The working area of Windows 8.1 Update is called the Windows ________
A) Charms B) Start screen C) GUI D) icons
Computer Science & Information Technology