Public-Key Infrastructure (PKI) must be used for ____ authentication.

A. Kerberos
B. 802.1x Wi-Fi
C. RADIUS
D. certificate-based

Answer: D

Computer Science & Information Technology

You might also like to view...

Bloom's Taxonomy describes how a person progresses through the learning process

Indicate whether the statement is true or false

Computer Science & Information Technology

The __________ operator returns a reference to a __________ object:

a. typeid, type_info b. typeinfo, type_id c. typeid, data_type d. typeinfo, type

Computer Science & Information Technology