Which protocol is the tool that programs use to query and change a database used by the network?

A. LDAP
B. EAP
C. Kerberos
D. NTP


Answer: A

Computer Science & Information Technology

You might also like to view...

The __________ shows the frame location for each page of the process.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Databases are used for operational processing and for analytical purposes

Indicate whether the statement is true or false

Computer Science & Information Technology

Although not a requirement, it is Java standard that class identifiers begin with an uppercase letter and use other uppercase letters to improve readability.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Three of the primary security control types that can be implemented are.

A. Supervisory, subordinate, and peer. B. Personal, procedural, and legal. C. Operational, technical, and management. D. Mandatory, discretionary, and permanent

Computer Science & Information Technology