Which of the following are valid authentication methods?
(a) Public Key Based
(b) Password Based
(c) Host Based
(d) All of the mentioned
This question was posed to me during an interview.
The query is from Overview topic in section Wireless Network Security and Network Security Overview of Cryptograph & Network Security