Q:

Which of the following are valid authentication methods?

0

Which of the following are valid authentication methods?


  1. Public Key Based
  2. Password Based
  3. Host Based
  4. All of the mentioned

All Answers

need an explanation for this answer? contact us directly to get an explanation for this answer

(d).All of the mentioned

need an explanation for this answer? contact us directly to get an explanation for this answer

total answers (1)

CRYPTOGRAPHY AND NETWORK SECURITY - NETWORK SECURITY CONCEPTS MCQ

This question belongs to these collections

Similar questions


need a help?


find thousands of online teachers now
The SSH Connection Protocol runs on top of the SSH... >>
<< SH_MSG_USERAUTH_SUCCESS is represented by the byte...