PdfPrep.com

Which of the following protocols should the company use?

A network administrator is configuring a honeypot in a company’s DMZ. To provide a method for hackers to access the system easily, the company needs to configure a plaintext authentication method that will send only the username and password to a service in the honeypot.

Which of the following protocols should the company use?
A . OAuth
B . PAP
C . RADIUS
D . Shibboleth

Answer: B

Exit mobile version