Which of the following protocols is used by several different operating systems to authenticate resources such as computers, users and printers?
A. LDAP
B. SMTP
C. TCP
D. UDP
Answer: A. LDAP
Computer Science & Information Technology
You might also like to view...
Rewrite the following if statement as an equivalent switch statement. The variable num is of type int.
``` if (num == 0 || num == 1) control = 100; else if (num == 2) control = 200; else if (num == 3) control = 300; else control = 0; ```
Computer Science & Information Technology
Which of the following crypt analysis methods involves looking at blocks of an encrypted message to determine if any commonpatterns exist?
A) Birthday attack B) Frequency analysis C) Brute force D) Differential crypt analysis
Computer Science & Information Technology