Which of the following authentication methods requires the user, service provider and an identity provider to take part in the authentication process?

A. RADIUS
B. SAML
C. Secure LDAP
D. Kerberos


Answer: A. RADIUS

Computer Science & Information Technology

You might also like to view...

Which of the following code statements generates an error?

(A) txtFirst.Text = "Hello" (B) txtFirst.Text = Hello (C) txtFirst.Text = "My Text" (D) txtFirst.Text = Me.Text

Computer Science & Information Technology

?Some objects might have a few attributes; others might have dozens.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In order to be considered strong today, a symmetric encryption key must be at least ________ bits long.

6 8 100 1,000

Computer Science & Information Technology

Case Based Critical ThinkingCase 1You are in charge of finalizing the text and type for a new website your company is building. Answer the following questions. You want to verify the copyright information for a font you are using on the Home page, how you do you check it?

A. Select the font's filename, right-click Properties (Win) or Ctrl-click>Get Info (Mac). B. Right-click the font's filename, double-click Properties (Win) or Ctrl-click>Get Info (Mac). C. Select the font's filename, double-click Properties (Win) or Ctrl-click>Get Info (Mac). D. Right-click the font's filename, double-click Properties (Win) or Ctrl-click>Get Info (Mac).

Computer Science & Information Technology