Which authentication method is commonly used for more-secure wireless networks?
A. PPP
B. EAP-PSK
C. EAP-TLS
D. LEAP
Answer: C
Computer Science & Information Technology
You might also like to view...
Discuss why the effectiveness of security activities can be hard for decision makers to assess.
What will be an ideal response?
Computer Science & Information Technology
________ searches use logical operators to join words you are searching for
Fill in the blank(s) with correct word
Computer Science & Information Technology
?Tags that are included within other tags are called ____ tags.
A. ?enclosed B. ?nested C. ?looped D. ?cocooned
Computer Science & Information Technology
For monitoring the physical locations of employees, video cameras are often used, but another possibility is the use of ____.
A. proximity cards B. presence technology C. face recognition D. video cards
Computer Science & Information Technology