Deck 8: Secure Wireless Authentication

ملء الشاشة (f)
exit full mode
سؤال
The system of using digital certificates,CAs,and other registration authorities that verify and authenticate the validity of each party involved in a transaction over a public network is known as ____.

A) AAA server
B) AAA infrastructure
C) public cryptography
D) public key infrastructure (PKI)
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A ____ deployment uses local authentication with one or more RADIUS servers at each site. However, the authentication database is replicated from one central site to each local site.

A) distributed autonomous site
B) distributed sites with centralized authentication and security
C) single site deployment
D) distributed sites and security with centralized authentication
سؤال
____ measures the resources a user consumes during each network session.

A) Accounting
B) Authorization
C) Authentication
D) Integrity
سؤال
LEAP is not vulnerable to dictionary attack tools.
سؤال
The X.500 standard defines a protocol for a client application to access an X.500 directory called the ____.

A) DAP
B) DIB
C) DIT
D) DIU
سؤال
Wireless authentication first requires the wireless device-not the user-to be authenticated before being connected to the WLAN.
سؤال
If authentication is performed by IEEE 802.1x using the WPA or WPA2 Enterprise model, the distribution of the ____, from which all other keys are formed, is done by the authentication server.

A) pairwise master key (PMK)
B) master key (MK)
C) pairwise transient key (PTK)
D) key confirmation key (KCK)
سؤال
____ is an industry standard protocol specification that forwards username and password information to a centralized server.

A) Kerberos
B) TACACS+
C) PKI
D) Asymmetric encryption
سؤال
With ____ deployment, RADIUS servers are located at each site to perform authentication. However, instead of the authentication database being replicated to each site, it is centrally located.

A) distributed autonomous site
B) distributed sites with centralized authentication and security
C) single site deployment
D) distributed sites and security with centralized authentication
سؤال
The MKs are used for access point to wireless device transmissions, or unicast transmissions.
سؤال
____ allows a RADIUS server to authenticate wireless devices stations by verifying a hash known as MD5 of each user's password.

A) PAP
B) CHAP
C) MS-CHAP
D) EAP-MD5
سؤال
____ uses the unique human characteristics of a person for authentication (something the user is).

A) Digital certificates
B) Passwords
C) Biometrics
D) Password tokens
سؤال
____ deployment consists of one or more RADIUS servers accessing a centralized authentication database.

A) Distributed autonomous sites
B) Distributed sites with centralized authentication and security
C) Single site
D) Distributed sites and security with centralized authentication
سؤال
LDAP was developed by Microsoft and the University of Michigan in 1996.
سؤال
EAP was originally defined for dial-up access but is now used for both wired and wireless access.
سؤال
Several of the EAP protocols use ____, which creates a ciphertext from cleartext.

A) symmetric encryption
B) hashing
C) asymmetric encryption
D) filtering
سؤال
In public key cryptography, the ____ key encrypts the message.

A) public
B) private
C) known
D) user
سؤال
____ requires that the wireless device and RADIUS server prove their identities to each other by using public key cryptography such as digital certificates.

A) PAP
B) LEAP
C) EAP-TLS
D) EAP-MD5
سؤال
The International Organization for Standardization (ISO) created a standard for directory services known as ____.

A) ISO.500
B) LDAP-1000
C) X.500
D) Z.101
سؤال
A ____ is a database stored on the network that contains information about users and network devices.

A) PKI
B) biometric service
C) Kerberos service
D) directory service
سؤال
The ____ is used by the EAP key exchanges to provide confidentiality.

A) KEK
B) KCK
C) WPAK
D) nonce key
سؤال
The ____________________ is used by the EAP key exchanges to provide data origin authenticity.
سؤال
The purpose of the ____ handshake is to authenticate the GTK.

A) group key
B) four-way
C) five-way
D) MK
سؤال
The management protocol of IEEE 802.1x that governs the interaction between the wireless device, access point, and RADIUS server is known as the ____________________.
سؤال
What are the primary differences between LDAP and DAP?
سؤال
What are the two types of device authentication supported by the IEEE 802.11 standard?
سؤال
Entries in the DIB are arranged in a tree structure called the ____________________.
سؤال
Access points and wireless devices must exchange information in order to create and acknowledge the MKs and the GKs. This exchange of information is known as ____.

A) WPA exchange
B) GK encryption
C) handshakes
D) MK exchange
سؤال
How does Kerberos work?
سؤال
____________________ is the process that determines whether the user has the authority to carry out certain tasks.
سؤال
The exchange of information for the MK is based on a ____.

A) group key handshake
B) PTK handshake
C) GTK encryption
D) four-way handshake
سؤال
When an AP sends the same packet to all wireless devices, known as a broadcast, MKs are not used. Instead, ____ are used.

A) temporal keys
B) group keys (GK)
C) key confirmation keys (KEKs)
D) pairwise master keys (PMKs)
سؤال
Identify the types of information typically included in a digital certificate.
سؤال
Briefly describe the functions of a RADIUS client and a RADIUS server.
سؤال
What are the advantages and disadvantages of distributed autonomous site deployment?
سؤال
What are the advantages and disadvantages of distributed sites with centralized authentication and security deployment?
سؤال
Certificates are issued by a trusted third party called a(n) ____________________.
سؤال
What is authentication for a wired network?
سؤال
The ____ is the value that the wireless devices use to decrypt broadcast messages from APs.

A) GTK
B) MK
C) PTK
D) PMK
سؤال
What are the steps for creating a pairwise master key (PMK)?
سؤال
Describe the main characteristics of the Challenge-Handshake Authentication Protocol (CHAP).
سؤال
Match between columns
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Nonce
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Registration authority (RA)
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
PAP
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Kerberos
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
MS-CHAP
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Password
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
EAP
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Digital certificates
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Group master key (GMK)
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Nonce
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Registration authority (RA)
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
PAP
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Kerberos
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
MS-CHAP
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Password
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
EAP
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Digital certificates
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Group master key (GMK)
Microsoft implementation of CHAP.
Nonce
Microsoft implementation of CHAP.
Registration authority (RA)
Microsoft implementation of CHAP.
PAP
Microsoft implementation of CHAP.
Kerberos
Microsoft implementation of CHAP.
MS-CHAP
Microsoft implementation of CHAP.
Password
Microsoft implementation of CHAP.
EAP
Microsoft implementation of CHAP.
Digital certificates
Microsoft implementation of CHAP.
Group master key (GMK)
electronic files that the user has and are used to uniquely identify users and resources over networks.
Nonce
electronic files that the user has and are used to uniquely identify users and resources over networks.
Registration authority (RA)
electronic files that the user has and are used to uniquely identify users and resources over networks.
PAP
electronic files that the user has and are used to uniquely identify users and resources over networks.
Kerberos
electronic files that the user has and are used to uniquely identify users and resources over networks.
MS-CHAP
electronic files that the user has and are used to uniquely identify users and resources over networks.
Password
electronic files that the user has and are used to uniquely identify users and resources over networks.
EAP
electronic files that the user has and are used to uniquely identify users and resources over networks.
Digital certificates
electronic files that the user has and are used to uniquely identify users and resources over networks.
Group master key (GMK)
a randomly chosen value.
Nonce
a randomly chosen value.
Registration authority (RA)
a randomly chosen value.
PAP
a randomly chosen value.
Kerberos
a randomly chosen value.
MS-CHAP
a randomly chosen value.
Password
a randomly chosen value.
EAP
a randomly chosen value.
Digital certificates
a randomly chosen value.
Group master key (GMK)
handles some CA tasks such as processing certificate requests and authenticating users.
Nonce
handles some CA tasks such as processing certificate requests and authenticating users.
Registration authority (RA)
handles some CA tasks such as processing certificate requests and authenticating users.
PAP
handles some CA tasks such as processing certificate requests and authenticating users.
Kerberos
handles some CA tasks such as processing certificate requests and authenticating users.
MS-CHAP
handles some CA tasks such as processing certificate requests and authenticating users.
Password
handles some CA tasks such as processing certificate requests and authenticating users.
EAP
handles some CA tasks such as processing certificate requests and authenticating users.
Digital certificates
handles some CA tasks such as processing certificate requests and authenticating users.
Group master key (GMK)
management protocol that controls port-based authentication.
Nonce
management protocol that controls port-based authentication.
Registration authority (RA)
management protocol that controls port-based authentication.
PAP
management protocol that controls port-based authentication.
Kerberos
management protocol that controls port-based authentication.
MS-CHAP
management protocol that controls port-based authentication.
Password
management protocol that controls port-based authentication.
EAP
management protocol that controls port-based authentication.
Digital certificates
management protocol that controls port-based authentication.
Group master key (GMK)
starting point of the group key hierarchy.
Nonce
starting point of the group key hierarchy.
Registration authority (RA)
starting point of the group key hierarchy.
PAP
starting point of the group key hierarchy.
Kerberos
starting point of the group key hierarchy.
MS-CHAP
starting point of the group key hierarchy.
Password
starting point of the group key hierarchy.
EAP
starting point of the group key hierarchy.
Digital certificates
starting point of the group key hierarchy.
Group master key (GMK)
authentication system developed by the Massachusetts Institute of Technology (MIT).
Nonce
authentication system developed by the Massachusetts Institute of Technology (MIT).
Registration authority (RA)
authentication system developed by the Massachusetts Institute of Technology (MIT).
PAP
authentication system developed by the Massachusetts Institute of Technology (MIT).
Kerberos
authentication system developed by the Massachusetts Institute of Technology (MIT).
MS-CHAP
authentication system developed by the Massachusetts Institute of Technology (MIT).
Password
authentication system developed by the Massachusetts Institute of Technology (MIT).
EAP
authentication system developed by the Massachusetts Institute of Technology (MIT).
Digital certificates
authentication system developed by the Massachusetts Institute of Technology (MIT).
Group master key (GMK)
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Secure Wireless Authentication
1
The system of using digital certificates,CAs,and other registration authorities that verify and authenticate the validity of each party involved in a transaction over a public network is known as ____.

A) AAA server
B) AAA infrastructure
C) public cryptography
D) public key infrastructure (PKI)
D
2
A ____ deployment uses local authentication with one or more RADIUS servers at each site. However, the authentication database is replicated from one central site to each local site.

A) distributed autonomous site
B) distributed sites with centralized authentication and security
C) single site deployment
D) distributed sites and security with centralized authentication
A
3
____ measures the resources a user consumes during each network session.

A) Accounting
B) Authorization
C) Authentication
D) Integrity
A
4
LEAP is not vulnerable to dictionary attack tools.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
The X.500 standard defines a protocol for a client application to access an X.500 directory called the ____.

A) DAP
B) DIB
C) DIT
D) DIU
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
Wireless authentication first requires the wireless device-not the user-to be authenticated before being connected to the WLAN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
If authentication is performed by IEEE 802.1x using the WPA or WPA2 Enterprise model, the distribution of the ____, from which all other keys are formed, is done by the authentication server.

A) pairwise master key (PMK)
B) master key (MK)
C) pairwise transient key (PTK)
D) key confirmation key (KCK)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
____ is an industry standard protocol specification that forwards username and password information to a centralized server.

A) Kerberos
B) TACACS+
C) PKI
D) Asymmetric encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
With ____ deployment, RADIUS servers are located at each site to perform authentication. However, instead of the authentication database being replicated to each site, it is centrally located.

A) distributed autonomous site
B) distributed sites with centralized authentication and security
C) single site deployment
D) distributed sites and security with centralized authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
The MKs are used for access point to wireless device transmissions, or unicast transmissions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
____ allows a RADIUS server to authenticate wireless devices stations by verifying a hash known as MD5 of each user's password.

A) PAP
B) CHAP
C) MS-CHAP
D) EAP-MD5
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
____ uses the unique human characteristics of a person for authentication (something the user is).

A) Digital certificates
B) Passwords
C) Biometrics
D) Password tokens
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
____ deployment consists of one or more RADIUS servers accessing a centralized authentication database.

A) Distributed autonomous sites
B) Distributed sites with centralized authentication and security
C) Single site
D) Distributed sites and security with centralized authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
LDAP was developed by Microsoft and the University of Michigan in 1996.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
EAP was originally defined for dial-up access but is now used for both wired and wireless access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
Several of the EAP protocols use ____, which creates a ciphertext from cleartext.

A) symmetric encryption
B) hashing
C) asymmetric encryption
D) filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
In public key cryptography, the ____ key encrypts the message.

A) public
B) private
C) known
D) user
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
____ requires that the wireless device and RADIUS server prove their identities to each other by using public key cryptography such as digital certificates.

A) PAP
B) LEAP
C) EAP-TLS
D) EAP-MD5
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
The International Organization for Standardization (ISO) created a standard for directory services known as ____.

A) ISO.500
B) LDAP-1000
C) X.500
D) Z.101
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
A ____ is a database stored on the network that contains information about users and network devices.

A) PKI
B) biometric service
C) Kerberos service
D) directory service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
The ____ is used by the EAP key exchanges to provide confidentiality.

A) KEK
B) KCK
C) WPAK
D) nonce key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
The ____________________ is used by the EAP key exchanges to provide data origin authenticity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
The purpose of the ____ handshake is to authenticate the GTK.

A) group key
B) four-way
C) five-way
D) MK
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
The management protocol of IEEE 802.1x that governs the interaction between the wireless device, access point, and RADIUS server is known as the ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
What are the primary differences between LDAP and DAP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
What are the two types of device authentication supported by the IEEE 802.11 standard?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Entries in the DIB are arranged in a tree structure called the ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
Access points and wireless devices must exchange information in order to create and acknowledge the MKs and the GKs. This exchange of information is known as ____.

A) WPA exchange
B) GK encryption
C) handshakes
D) MK exchange
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
How does Kerberos work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
____________________ is the process that determines whether the user has the authority to carry out certain tasks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
The exchange of information for the MK is based on a ____.

A) group key handshake
B) PTK handshake
C) GTK encryption
D) four-way handshake
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
When an AP sends the same packet to all wireless devices, known as a broadcast, MKs are not used. Instead, ____ are used.

A) temporal keys
B) group keys (GK)
C) key confirmation keys (KEKs)
D) pairwise master keys (PMKs)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
Identify the types of information typically included in a digital certificate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
Briefly describe the functions of a RADIUS client and a RADIUS server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
What are the advantages and disadvantages of distributed autonomous site deployment?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
What are the advantages and disadvantages of distributed sites with centralized authentication and security deployment?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Certificates are issued by a trusted third party called a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
What is authentication for a wired network?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
The ____ is the value that the wireless devices use to decrypt broadcast messages from APs.

A) GTK
B) MK
C) PTK
D) PMK
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are the steps for creating a pairwise master key (PMK)?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Describe the main characteristics of the Challenge-Handshake Authentication Protocol (CHAP).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Nonce
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Registration authority (RA)
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
PAP
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Kerberos
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
MS-CHAP
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Password
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
EAP
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Digital certificates
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Group master key (GMK)
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Nonce
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Registration authority (RA)
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
PAP
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Kerberos
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
MS-CHAP
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Password
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
EAP
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Digital certificates
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Group master key (GMK)
Microsoft implementation of CHAP.
Nonce
Microsoft implementation of CHAP.
Registration authority (RA)
Microsoft implementation of CHAP.
PAP
Microsoft implementation of CHAP.
Kerberos
Microsoft implementation of CHAP.
MS-CHAP
Microsoft implementation of CHAP.
Password
Microsoft implementation of CHAP.
EAP
Microsoft implementation of CHAP.
Digital certificates
Microsoft implementation of CHAP.
Group master key (GMK)
electronic files that the user has and are used to uniquely identify users and resources over networks.
Nonce
electronic files that the user has and are used to uniquely identify users and resources over networks.
Registration authority (RA)
electronic files that the user has and are used to uniquely identify users and resources over networks.
PAP
electronic files that the user has and are used to uniquely identify users and resources over networks.
Kerberos
electronic files that the user has and are used to uniquely identify users and resources over networks.
MS-CHAP
electronic files that the user has and are used to uniquely identify users and resources over networks.
Password
electronic files that the user has and are used to uniquely identify users and resources over networks.
EAP
electronic files that the user has and are used to uniquely identify users and resources over networks.
Digital certificates
electronic files that the user has and are used to uniquely identify users and resources over networks.
Group master key (GMK)
a randomly chosen value.
Nonce
a randomly chosen value.
Registration authority (RA)
a randomly chosen value.
PAP
a randomly chosen value.
Kerberos
a randomly chosen value.
MS-CHAP
a randomly chosen value.
Password
a randomly chosen value.
EAP
a randomly chosen value.
Digital certificates
a randomly chosen value.
Group master key (GMK)
handles some CA tasks such as processing certificate requests and authenticating users.
Nonce
handles some CA tasks such as processing certificate requests and authenticating users.
Registration authority (RA)
handles some CA tasks such as processing certificate requests and authenticating users.
PAP
handles some CA tasks such as processing certificate requests and authenticating users.
Kerberos
handles some CA tasks such as processing certificate requests and authenticating users.
MS-CHAP
handles some CA tasks such as processing certificate requests and authenticating users.
Password
handles some CA tasks such as processing certificate requests and authenticating users.
EAP
handles some CA tasks such as processing certificate requests and authenticating users.
Digital certificates
handles some CA tasks such as processing certificate requests and authenticating users.
Group master key (GMK)
management protocol that controls port-based authentication.
Nonce
management protocol that controls port-based authentication.
Registration authority (RA)
management protocol that controls port-based authentication.
PAP
management protocol that controls port-based authentication.
Kerberos
management protocol that controls port-based authentication.
MS-CHAP
management protocol that controls port-based authentication.
Password
management protocol that controls port-based authentication.
EAP
management protocol that controls port-based authentication.
Digital certificates
management protocol that controls port-based authentication.
Group master key (GMK)
starting point of the group key hierarchy.
Nonce
starting point of the group key hierarchy.
Registration authority (RA)
starting point of the group key hierarchy.
PAP
starting point of the group key hierarchy.
Kerberos
starting point of the group key hierarchy.
MS-CHAP
starting point of the group key hierarchy.
Password
starting point of the group key hierarchy.
EAP
starting point of the group key hierarchy.
Digital certificates
starting point of the group key hierarchy.
Group master key (GMK)
authentication system developed by the Massachusetts Institute of Technology (MIT).
Nonce
authentication system developed by the Massachusetts Institute of Technology (MIT).
Registration authority (RA)
authentication system developed by the Massachusetts Institute of Technology (MIT).
PAP
authentication system developed by the Massachusetts Institute of Technology (MIT).
Kerberos
authentication system developed by the Massachusetts Institute of Technology (MIT).
MS-CHAP
authentication system developed by the Massachusetts Institute of Technology (MIT).
Password
authentication system developed by the Massachusetts Institute of Technology (MIT).
EAP
authentication system developed by the Massachusetts Institute of Technology (MIT).
Digital certificates
authentication system developed by the Massachusetts Institute of Technology (MIT).
Group master key (GMK)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.