Matching
Match each item with an statement below:
Premises:
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Microsoft implementation of CHAP.
electronic files that the user has and are used to uniquely identify users and resources over networks.
a randomly chosen value.
handles some CA tasks such as processing certificate requests and authenticating users.
management protocol that controls port-based authentication.
starting point of the group key hierarchy.
authentication system developed by the Massachusetts Institute of Technology (MIT).
Responses:
Password
EAP
MS-CHAP
PAP
Group master key (GMK)
Digital certificates
Nonce
Kerberos
Registration authority (RA)
Correct Answer:
Premises:
Responses:
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Microsoft implementation of CHAP.
electronic files that the user has and are used to uniquely identify users and resources over networks.
a randomly chosen value.
handles some CA tasks such as processing certificate requests and authenticating users.
management protocol that controls port-based authentication.
starting point of the group key hierarchy.
authentication system developed by the Massachusetts Institute of Technology (MIT).
Premises:
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Microsoft implementation of CHAP.
electronic files that the user has and are used to uniquely identify users and resources over networks.
a randomly chosen value.
handles some CA tasks such as processing certificate requests and authenticating users.
management protocol that controls port-based authentication.
starting point of the group key hierarchy.
authentication system developed by the Massachusetts Institute of Technology (MIT).
Responses:
Related Questions
Q32: When an AP sends the same packet
Q33: Identify the types of information typically included
Q34: Briefly describe the functions of a RADIUS
Q35: What are the advantages and disadvantages of
Q36: What are the advantages and disadvantages of
Q37: Certificates are issued by a trusted third
Q38: What is authentication for a wired network?
Q39: The _ is the value that the
Q40: What are the steps for creating a
Q41: Describe the main characteristics of the Challenge-Handshake
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents