Which of the following authentication mechanisms on a wireless network uses a separate network authentication server?

A. Kerberos
B. TKIP
C. RADIUS
D. WEP

Answer: C. RADIUS

Computer Science & Information Technology

You might also like to view...

A text file can be converted from tab delimited text to a Word table by selecting the ________ command that easily converts a tabbed file into a table

Fill in the blank(s) with correct word

Computer Science & Information Technology

The expression aptr->suit is equivalent to __________.

a) aptr.suit b) *aptr.suit c) (*aptr).suit d) *aptr.(suit)

Computer Science & Information Technology