Which of the following protocols is used by several different operating systems to authenticate resources such as computers, users and printers?

A. LDAP
B. SMTP
C. TCP
D. UDP

Answer: A. LDAP

Computer Science & Information Technology

You might also like to view...

Rewrite the following if statement as an equivalent switch statement. The variable num is of type int.

``` if (num == 0 || num == 1) control = 100; else if (num == 2) control = 200; else if (num == 3) control = 300; else control = 0; ```

Computer Science & Information Technology

Which of the following crypt analysis methods involves looking at blocks of an encrypted message to determine if any commonpatterns exist?

A) Birthday attack B) Frequency analysis C) Brute force D) Differential crypt analysis

Computer Science & Information Technology