Match each item with a statement below:

A. a feature that enables users to access resources over the network without having to repeatedly supply their credentials
B. protocol that picks one of the available authentication methods for a system
C. a traditional authentication method for Windows operating systems using a simple challenge response protocol
D. allows fine-grained control over the mapping between access control and tasks performed in the deployment area
E. divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
F. a place where a number of services are being offered
G. the core authentication class in JAAS
H. a framework for authentication and authorization in Internet protocols
I. retrieves and makes available NT security information for the current user


A. Single sign-on
B. Negotiate
C. NTLM authentication
D. Role-based authorization
E. PAM
F. Resource
G. LoginContext
H. SASL
I. NTSystem PAM

Computer Science & Information Technology

You might also like to view...

The other classes or functions that use a certain class are commonly referred to as its:

a. Clients. b. Data members. c. Member functions. d. Methods.

Computer Science & Information Technology

The enumerated type is a user-defined type based on real numbers.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To change the value of a property, you first click the property value.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A path is defined as one or more straight or curved line segments connected by anchor points.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology