____ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.

A. Kerberos
B. Dynamic WEP
C. WEP2
D. LDAP


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following commands can be used in a function?

A. return 3; B. document.write("Hello World"); C. z = 1 + 2; D. all of the above

Computer Science & Information Technology

A footnote consists of one or more lines at the bottom of each page.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The __________ of InfoSec is a strategic planning responsibility whose importance has grown rapidly over the past several years.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Hubs are differentiated from switches in that between the two, only hubs have:

A. a single collision domain. B. a single broadcast domain. C. multiple collision domains. D. multiple broadcast domains.

Computer Science & Information Technology