If an organization does not want to rely on a wireless device to authenticate users, which of the following is a secure alternative?

A. RADIUS server
B. Certificate server
C. WPA2
D. Proxy server


Answer: A

Computer Science & Information Technology

You might also like to view...

____________________ is a nonvolatile storage chip that uses byte-wise writable memories.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The styles window is a pane that displays a list of styles and contains tools to manage styles

Indicate whether the statement is true or false

Computer Science & Information Technology

The heading placed above multiple columns is called a masthead or _________ heading.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The _____ value of a future dollar is the amount of money that, when invested today at a specified interest rate, grows to exactly one dollar at a certain point in the future. 

A. projected B. present  C. potential D. perceived

Computer Science & Information Technology