The NAU in SNA that is the End User’s access point to the network is the

a. LU
b. SSCP
c. PU
d. SDLC


a. LU

Computer Science & Information Technology

You might also like to view...

Although it is an exciting medium, 3D animation is still a curiosity on the Web. Why is this? List several reasons.

What will be an ideal response?

Computer Science & Information Technology

One limitation within Ruby programming is the inability to redirect STDIN and STDOUT.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What elements are required to create a network?

What will be an ideal response?

Computer Science & Information Technology

Which process is being described by the following steps? 1. A user logs into domain A using a PKI certificate on a smartcard protected by an 8-digit PIN. 2. The credential is cached by the authenticating server in domain

A. 3. Later, the user attempts to access a resource in domain B. 4. A request to the original authenticating server is initiated to somehow attest to the resource server in the second domain that the user is in fact who they claim to be. A. HTML B. SAML C. SOAP D. IPsec

Computer Science & Information Technology