Public-Key Infrastructure (PKI) must be used for ____ authentication.
A. Kerberos
B. 802.1x Wi-Fi
C. RADIUS
D. certificate-based
Answer: D
Computer Science & Information Technology
You might also like to view...
Bloom's Taxonomy describes how a person progresses through the learning process
Indicate whether the statement is true or false
Computer Science & Information Technology
The __________ operator returns a reference to a __________ object:
a. typeid, type_info b. typeinfo, type_id c. typeid, data_type d. typeinfo, type
Computer Science & Information Technology