
YYYY
Authored by Ralph Lanzaderas
Mathematics
1st - 5th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
53 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It was developed by MIT to use SSO.
Layer 2 Tunneling Protocol (L2TP)
Point-to-Point Tunneling Protocol (PPTP)
Tunneling
Kerberos
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
These are used for centralized management and configuration of the Active Directory environment.
Privileged account
Account lockout
Account policy
Group Policy Object
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a document which outlines the requirements for requesting and maintaining an account on computer systems or networks, typically within an organization.
Password complexity
Account Policy
Credential management
Passwords
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
PK stands for:
Private King
Pirate Key
Public Kiosk
Public Key
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It may be a set of parts, arrangements, and strategies required to form, oversee, convey, utilize, store & revoke computerized certificates and oversee public-key encryption
Certificate authentication
PKI
Digital certificate
CA
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Users can request a digital certificate from a CA manually or automatically without any interaction on their part
certificate release
certificate enrollment
Online root CAs
Offline root Cas
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
PK stands for:
Pirate Key
Public Kiosk
Private King
Private Key
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?