Which of the following is a more advanced technique to authenticate a user for gaining access to wired and wireless networks? (Select two.)

a. 802.11x
b. 802.1x
c. dot1x
d. 849.1x

b. 802.1x
c. dot1x

Computer Science & Information Technology

You might also like to view...

The digital forensics competency area is the primary responsibility of the ____ professional.

A. risk B. security compliance C. digital forensics D. incident management

Computer Science & Information Technology

________ can be used as pointers.

A) Array names B) C++ string objects C) Punctuation marks D) All of the above E) None of the above

Computer Science & Information Technology