Jennifer’s company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting to manage users on its network. The company uses a wireless network and an earlier authentication service on the server to authenticate end users accessing resources on the network.
?
What type of service is Jennifer’s company using?

A. TKIP
B. WPA2
C. WEP
D. RADIUS


Answer: D

Computer Science & Information Technology

You might also like to view...

With ____________________, the file system caches the data in a hidden file until the kernel has finished writing the data to a drive.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When discussions are posted on Web pages with related responses, this is called a(n) ________

A) reflector list B) message board C) e-list D) moderator list

Computer Science & Information Technology

You can save a single worksheet as a webpage, where Excel changes the content of the worksheet into ________, a language web browsers can interpret

Fill in the blank(s) with correct word

Computer Science & Information Technology

Criminal trials are often preceded by a(n) ________ at which the admissibility of evidence is determined

Fill in the blank(s) with correct word

Computer Science & Information Technology