What specific authentication protocol used in a Windows domain environment to authenticate logons and grant accounts access to domain resources?
A. Kerberos
B. RADIUS
C. TACACS
D. PPP
Answer: A
You might also like to view...
Write the declaration for a function named funct1 that expects an array of floats, the number of elements in the array and does not return any value.
What will be an ideal response?
When a critical section must be protected for a long time, ________ are a better choice for implementing mutual exclusion.
a) reader/writer locks b) seqlocks c) kernel semaphores d) kernel monitors
____ data items may involve organizing or sorting them, checking them for accuracy, or performing calculations with them.
A. Processing B. Inputting C. Outputting D. Converting
When a single variable may need to be tested for five different values, the most readable solution would be a(n) ____.
A. one-way if statement B. two-way if statement C. switch statement D. nested if....else statement