which authentication approach to ensure communication and the users?? identity?

Public and private keys are applied by which authentication approach to ensure communication
and the users?? identity?

Public and private keys are applied by which authentication approach to ensure communication
and the users?? identity?

A.
Kerberos

B.
EAP

C.
CHAP

D.
PKI



Leave a Reply 0

Your email address will not be published. Required fields are marked *