What specific authentication protocol used in a Windows domain environment to authenticate logons and grant accounts access to domain resources?

A. Kerberos
B. RADIUS
C. TACACS
D. PPP


Answer: A

Computer Science & Information Technology

You might also like to view...

Write the declaration for a function named funct1 that expects an array of floats, the number of elements in the array and does not return any value.

What will be an ideal response?

Computer Science & Information Technology

When a critical section must be protected for a long time, ________ are a better choice for implementing mutual exclusion.

a) reader/writer locks b) seqlocks c) kernel semaphores d) kernel monitors

Computer Science & Information Technology

____ data items may involve organizing or sorting them, checking them for accuracy, or performing calculations with them.

A. Processing B. Inputting C. Outputting D. Converting

Computer Science & Information Technology

When a single variable may need to be tested for five different values, the most readable solution would be a(n) ____.

A. one-way if statement B. two-way if statement C. switch statement D. nested if....else statement

Computer Science & Information Technology