Which of the following is an authentication method that can be secured by using SSL?

A. RADIUS
B. LDAP
C. TACACS+
D. Kerberos

Answer: B. LDAP

Computer Science & Information Technology

You might also like to view...

The theme selected for a presentation controls the colors used in tables and charts, but not graphics and SmartArt

Indicate whether the statement is true or false

Computer Science & Information Technology

A curious computer user is ready to check out a CRT video problem with a computer system. Because of safety concerns, which one of the following procedures should be carried out only after receiving specialized technical training?

A) Turning the monitor power off and pushing the power cord plug firmly into its socket on the back of the monitor B) Unplugging the monitor, removing its case, and probing various components C) Unplugging the PC?s power cord from the wall D) Turning the computer off before removing the computer cover

Computer Science & Information Technology