A company wants to make sure that users are required to authenticate prior to being allowed on the network. Which of the following is the BEST way to accomplish this?

A. 802.1x
B. 802.1p
C. Single sign-on
D. Kerberos

Answer: A. 802.1x

Computer Science & Information Technology

You might also like to view...

OpenOffice Writer is associated with the ____________________ file extension.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The internal monitoring domain is the component of the maintenance model that focuses on identifying, assessing, and managing the physical security of assets in an organization.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology