A security analyst is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation. Given these requirements, which of the following technologies should the analyst recommend and configure?

A. LDAP services
B. Kerberos services
C. NTLM services
D. CHAP services

Answer: B. Kerberos services

Computer Science & Information Technology

You might also like to view...

Select the answer that displays the accurate placing of the pipe in the following search string: index=security sourcetype=access_* status=200 stats count by price

A. index=security sourcetype=access_* status=200 stats | count by price B. index=security sourcetype=access_* status=200 | stats count by price C. index=security sourcetype=access_* status=200 | stats count | by price D. index=security sourcetype=access_* | status=200 | stats count by price

Computer Science & Information Technology

catch blocks are not required to contain:

a. Braces { }. b. Parentheses ( ). c. Some form of parameter type indication. d. A parameter name.

Computer Science & Information Technology