Which of the following protocols should the company use?

Posted by: Pdfprep Category: SY0-501 Tags: , ,

A network administrator is configuring a honeypot in a company’s DMZ. To provide a method for hackers to access the system easily, the company needs to configure a plaintext authentication method that will send only the username and password to a service in the honeypot.

Which of the following protocols should the company use?
A . OAuth
B . PAP
C . RADIUS
D . Shibboleth

Answer: B

Leave a Reply

Your email address will not be published.