Which of the following is an authentication method that can be secured by using SSL?

A. RADIUS
B. LDAP
C. TACACS+
D. Kerberos


Answer: B. LDAP

Computer Science & Information Technology

You might also like to view...

Map method ________ is used to determine whether a map contains a mapping for the specified key.

a. containsKey b. hasKey c. containsMapping d. hasMapping

Computer Science & Information Technology

In a(n) ____-controlled loop, the continuation condition is tested at the top of the loop on each pass.

A. task B. entry C. count D. All of the above

Computer Science & Information Technology

Formats applied to images that make pictures resemble sketches or paintings are:

a. Artistic Effects b. Styles c. Picture Effects

Computer Science & Information Technology

The working area of Windows 8.1 Update is called the Windows ________

A) Charms B) Start screen C) GUI D) icons

Computer Science & Information Technology