A security administrator has installed a new KDC for the corporate environment. Which of the following authentication protocols is the security administrator planning to implement across the organization?

A. LDAP
B. RADIUS
C. Kerberos
D. XTACACS


Answer: C. Kerberos

Computer Science & Information Technology

You might also like to view...

If a project is scheduled from a Start date and you enter a Finish date into the Entry table for a task, then Project 2010 will automatically apply the ____ constraint type to that task.

A. Start No Earlier Than B. Start No Later Than C. Finish No Later Than D. Finish No Earlier Than

Computer Science & Information Technology

The true benefit of Power Query is in its ability to manipulate the data before importing it into Excel

Indicate whether the statement is true or false

Computer Science & Information Technology

Which two components would be found in a home server computer? (Select two.)

A) Minimum RAM B) Multiple hard drives in a RAID array configuration C) Multiple KVM switches D) Multiple processors E) Dual monitors

Computer Science & Information Technology

?As the author, you can edit a published Sway site by clicking the__________. 

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology