Jennifer’s company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting to manage users on its network. The company uses a wireless network and an earlier authentication service on the server to authenticate end users accessing resources on the network.
?
What type of service is Jennifer’s company using?
A. TKIP
B. WPA2
C. WEP
D. RADIUS
Answer: D
Computer Science & Information Technology
You might also like to view...
With ____________________, the file system caches the data in a hidden file until the kernel has finished writing the data to a drive.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
When discussions are posted on Web pages with related responses, this is called a(n) ________
A) reflector list B) message board C) e-list D) moderator list
Computer Science & Information Technology
You can save a single worksheet as a webpage, where Excel changes the content of the worksheet into ________, a language web browsers can interpret
Fill in the blank(s) with correct word
Computer Science & Information Technology
Criminal trials are often preceded by a(n) ________ at which the admissibility of evidence is determined
Fill in the blank(s) with correct word
Computer Science & Information Technology