Which of the following is a protocol that centralizes authentication, authorization, and accounting?

A. Kerberos
B. mutual authentication
C. EAP
D. RADIUS


Answer: D

Computer Science & Information Technology

You might also like to view...

A program is a sequence of instructions stored in

a. the CPU b. the computer's memory c. software d. firmware

Computer Science & Information Technology

A _____ might involve maximums for one or more resources, such as time, dollars, or people.

A. successor task B. constraint C. task ID D. milestone

Computer Science & Information Technology

The vast majority of smartphones use the ________ or ________ operating systems.

What will be an ideal response?

Computer Science & Information Technology

How do Webcastsdiffer from Webinars?

a. Webcasts are led by a presenter, whereas Webinars broadcast audio or video. b. Webcasts allow limited one-way communication, whereas Webinars allow some level of two-way communication. c. Webcasts allow users to create and edit Web page content, whereas Webinars limit users to the browsing of Web pages. d. Webcasts allow questions to be directed to the presenter, whereas Webinars allow questions to be emailed or faxed to the presenter.

Computer Science & Information Technology