Which of the following authentication mechanisms on a wireless network uses a separate network authentication server?
A. Kerberos
B. TKIP
C. RADIUS
D. WEP
Answer: C. RADIUS
Computer Science & Information Technology
You might also like to view...
A text file can be converted from tab delimited text to a Word table by selecting the ________ command that easily converts a tabbed file into a table
Fill in the blank(s) with correct word
Computer Science & Information Technology
The expression aptr->suit is equivalent to __________.
a) aptr.suit b) *aptr.suit c) (*aptr).suit d) *aptr.(suit)
Computer Science & Information Technology