1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dominik [7]
3 years ago
13

A company is deploying a file-sharing protocol across a network and needs to select a protocol for authenticating clients. Manag

ement requests that the service be configured in the most secure way possible. The protocol must also be capable of mutual authentication, and support SSO and smart card logons. Which of the following would best accomplish this task?A. Store credentials in LDAP
B. Use NTLM authentication
C. Implement Kerberos
D. Use MSCHAP authentication
Computers and Technology
1 answer:
VARVARA [1.3K]3 years ago
6 0

Answer:

The answer is "Option C".

Explanation:

Among all four of the above, the application of Kerberos is securer. The consumer not just to validates the provider but also verifies the product to the clients with secure authentication.  

  • It offers a common interface between windows as well as other operating systems.  
  • The user login Smart Card gives much higher protection as it allows security with two factors, that's why except Option C other choices were wrong.
You might be interested in
Which method of accessing FTP has the most limited capabilities?
alexira [117]

Answer:

I think through a web browser as all OSs have a built in FTP client so it would be web browser

Explanation:

7 0
3 years ago
Read 2 more answers
You have just installed a new sound card in your system, and Windows says the card installed with no errors. When you plug up th
Alona [7]

Answer:

Explanation:

I should check the volume controls on the speaker amplifier.

3 0
3 years ago
Write code which takes inputs and creates two Rectangle objects (using the edhesive.shapes.Rectangle class) and compares them us
iogann1982 [59]

Answer:

System.out.println("Enter length:");

Scanner scan = new Scanner(System.in);

Double x = scan.nextDouble();

System.out.println("Enter 2 lengths:");

Double a = scan.nextDouble();

Double b = scan.nextDouble();

Rectangle rect = new Rectangle(x);

Rectangle rect2 = new Rectangle (a,b);

if (rect2.equals(rect)){

 System.out.print("Congruent Rectangles");

}

else {

 System.out.print("Different Rectangles");

}

 }

}

Explanation:

6 0
3 years ago
At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this
Makovka662 [10]

Answer:

Encapsulation

Explanation:

There are seven layers in the OSI network model. These layers are, application, presentation, session, transport, network, data-link and physical layer.

Each layer of the OSI model has a PDU or protocol data unit. These PDUs are form by encapsulation.

The application, presentation and session data. When it moves to the transport layer, it is encapsulated within the transport header. This new pdu is called segment.

This process continues in network and data-link to give packet and frame PDUs respectively.

5 0
3 years ago
Which of the following methods is the easiest way to set up a VPN client on a computer for a user who is not technical?
Pie

Answer:

Option D.

Use CMAK to create an executable to install.

Explanation:

The CMAK is the Connection Manager Administration Kit it is a feature in Microsoft Windows that allows users to customize the remote connection experience for users on their network.

The CMAK can be simply used by the technical expert to remotely operate the client computer, and customize the VPN himself without the non-technical user having to do anything. This can be done for computers only on a network however.

3 0
3 years ago
Other questions:
  • Considers the assets of all things in an environment, and refers to the layering of security tools and methods often varying num
    13·1 answer
  • I’m which scenario would someone most likely be using presentation software ?
    6·2 answers
  • True or False?
    8·1 answer
  • Which of these is NOT a reason why you would print handouts of your presentation?
    14·1 answer
  • A Gym Masters system programmer has just installed the first Windows Server 2016 sys- tem and now needs to do an initial configu
    13·1 answer
  • Which of the following is the best example of an installation issue
    11·2 answers
  • What do macOS and Windows use to prevent us from accidentally deleting files?
    15·1 answer
  • In binary, if there is a 1 in the 1s place the number is always
    9·1 answer
  • Select all steps in the list below that should be completed when using the problem-solving process discussed in this chapter.
    14·1 answer
  • A _____ is a grid that displays fields as columns and records as rows.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!