A network administrator needs to ensure that users are authenticated before they are given access to the network. Which of the following BEST meets these requirements?
A. 802.1s
B. 802.1d
C. 802.1x
D. 802.1w
Answer: C. 802.1x
Computer Science & Information Technology
You might also like to view...
Alice lets us build programs consisting of statements, in which we often send messages to ____.
A. classes B. objects C. functions D. methods
Computer Science & Information Technology
The ____ file format can store both vector and bitmap data.
a. JPEG b. GIF c. PSD d. EPS
Computer Science & Information Technology