The ____ in an 802.1x configuration stores the list of the names and credentials of authorized users to verify their authenticity.

A. supplicant
B. authenticator
C. authentication server
D. RADIUS

Answer: C

Computer Science & Information Technology

You might also like to view...

Privilege escalation is used in computer programs to bypass normal authentication

Indicate whether the statement is true or false

Computer Science & Information Technology

Adaptability of the WiMAX channel size allows it to adjust to use the entire allocated what? (select one.)

What will be an ideal response?

Computer Science & Information Technology