Deck 8: Secure Wireless Authentication

Full screen (f)
exit full mode
Question
The system of using digital certificates,CAs,and other registration authorities that verify and authenticate the validity of each party involved in a transaction over a public network is known as ____.

A) AAA server
B) AAA infrastructure
C) public cryptography
D) public key infrastructure (PKI)
Use Space or
up arrow
down arrow
to flip the card.
Question
A ____ deployment uses local authentication with one or more RADIUS servers at each site. However, the authentication database is replicated from one central site to each local site.

A) distributed autonomous site
B) distributed sites with centralized authentication and security
C) single site deployment
D) distributed sites and security with centralized authentication
Question
____ measures the resources a user consumes during each network session.

A) Accounting
B) Authorization
C) Authentication
D) Integrity
Question
LEAP is not vulnerable to dictionary attack tools.
Question
The X.500 standard defines a protocol for a client application to access an X.500 directory called the ____.

A) DAP
B) DIB
C) DIT
D) DIU
Question
Wireless authentication first requires the wireless device-not the user-to be authenticated before being connected to the WLAN.
Question
If authentication is performed by IEEE 802.1x using the WPA or WPA2 Enterprise model, the distribution of the ____, from which all other keys are formed, is done by the authentication server.

A) pairwise master key (PMK)
B) master key (MK)
C) pairwise transient key (PTK)
D) key confirmation key (KCK)
Question
____ is an industry standard protocol specification that forwards username and password information to a centralized server.

A) Kerberos
B) TACACS+
C) PKI
D) Asymmetric encryption
Question
With ____ deployment, RADIUS servers are located at each site to perform authentication. However, instead of the authentication database being replicated to each site, it is centrally located.

A) distributed autonomous site
B) distributed sites with centralized authentication and security
C) single site deployment
D) distributed sites and security with centralized authentication
Question
The MKs are used for access point to wireless device transmissions, or unicast transmissions.
Question
____ allows a RADIUS server to authenticate wireless devices stations by verifying a hash known as MD5 of each user's password.

A) PAP
B) CHAP
C) MS-CHAP
D) EAP-MD5
Question
____ uses the unique human characteristics of a person for authentication (something the user is).

A) Digital certificates
B) Passwords
C) Biometrics
D) Password tokens
Question
____ deployment consists of one or more RADIUS servers accessing a centralized authentication database.

A) Distributed autonomous sites
B) Distributed sites with centralized authentication and security
C) Single site
D) Distributed sites and security with centralized authentication
Question
LDAP was developed by Microsoft and the University of Michigan in 1996.
Question
EAP was originally defined for dial-up access but is now used for both wired and wireless access.
Question
Several of the EAP protocols use ____, which creates a ciphertext from cleartext.

A) symmetric encryption
B) hashing
C) asymmetric encryption
D) filtering
Question
In public key cryptography, the ____ key encrypts the message.

A) public
B) private
C) known
D) user
Question
____ requires that the wireless device and RADIUS server prove their identities to each other by using public key cryptography such as digital certificates.

A) PAP
B) LEAP
C) EAP-TLS
D) EAP-MD5
Question
The International Organization for Standardization (ISO) created a standard for directory services known as ____.

A) ISO.500
B) LDAP-1000
C) X.500
D) Z.101
Question
A ____ is a database stored on the network that contains information about users and network devices.

A) PKI
B) biometric service
C) Kerberos service
D) directory service
Question
The ____ is used by the EAP key exchanges to provide confidentiality.

A) KEK
B) KCK
C) WPAK
D) nonce key
Question
The ____________________ is used by the EAP key exchanges to provide data origin authenticity.
Question
The purpose of the ____ handshake is to authenticate the GTK.

A) group key
B) four-way
C) five-way
D) MK
Question
The management protocol of IEEE 802.1x that governs the interaction between the wireless device, access point, and RADIUS server is known as the ____________________.
Question
What are the primary differences between LDAP and DAP?
Question
What are the two types of device authentication supported by the IEEE 802.11 standard?
Question
Entries in the DIB are arranged in a tree structure called the ____________________.
Question
Access points and wireless devices must exchange information in order to create and acknowledge the MKs and the GKs. This exchange of information is known as ____.

A) WPA exchange
B) GK encryption
C) handshakes
D) MK exchange
Question
How does Kerberos work?
Question
____________________ is the process that determines whether the user has the authority to carry out certain tasks.
Question
The exchange of information for the MK is based on a ____.

A) group key handshake
B) PTK handshake
C) GTK encryption
D) four-way handshake
Question
When an AP sends the same packet to all wireless devices, known as a broadcast, MKs are not used. Instead, ____ are used.

A) temporal keys
B) group keys (GK)
C) key confirmation keys (KEKs)
D) pairwise master keys (PMKs)
Question
Identify the types of information typically included in a digital certificate.
Question
Briefly describe the functions of a RADIUS client and a RADIUS server.
Question
What are the advantages and disadvantages of distributed autonomous site deployment?
Question
What are the advantages and disadvantages of distributed sites with centralized authentication and security deployment?
Question
Certificates are issued by a trusted third party called a(n) ____________________.
Question
What is authentication for a wired network?
Question
The ____ is the value that the wireless devices use to decrypt broadcast messages from APs.

A) GTK
B) MK
C) PTK
D) PMK
Question
What are the steps for creating a pairwise master key (PMK)?
Question
Describe the main characteristics of the Challenge-Handshake Authentication Protocol (CHAP).
Question
Match between columns
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Nonce
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Registration authority (RA)
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
PAP
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Kerberos
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
MS-CHAP
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Password
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
EAP
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Digital certificates
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Group master key (GMK)
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Nonce
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Registration authority (RA)
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
PAP
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Kerberos
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
MS-CHAP
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Password
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
EAP
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Digital certificates
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Group master key (GMK)
Microsoft implementation of CHAP.
Nonce
Microsoft implementation of CHAP.
Registration authority (RA)
Microsoft implementation of CHAP.
PAP
Microsoft implementation of CHAP.
Kerberos
Microsoft implementation of CHAP.
MS-CHAP
Microsoft implementation of CHAP.
Password
Microsoft implementation of CHAP.
EAP
Microsoft implementation of CHAP.
Digital certificates
Microsoft implementation of CHAP.
Group master key (GMK)
electronic files that the user has and are used to uniquely identify users and resources over networks.
Nonce
electronic files that the user has and are used to uniquely identify users and resources over networks.
Registration authority (RA)
electronic files that the user has and are used to uniquely identify users and resources over networks.
PAP
electronic files that the user has and are used to uniquely identify users and resources over networks.
Kerberos
electronic files that the user has and are used to uniquely identify users and resources over networks.
MS-CHAP
electronic files that the user has and are used to uniquely identify users and resources over networks.
Password
electronic files that the user has and are used to uniquely identify users and resources over networks.
EAP
electronic files that the user has and are used to uniquely identify users and resources over networks.
Digital certificates
electronic files that the user has and are used to uniquely identify users and resources over networks.
Group master key (GMK)
a randomly chosen value.
Nonce
a randomly chosen value.
Registration authority (RA)
a randomly chosen value.
PAP
a randomly chosen value.
Kerberos
a randomly chosen value.
MS-CHAP
a randomly chosen value.
Password
a randomly chosen value.
EAP
a randomly chosen value.
Digital certificates
a randomly chosen value.
Group master key (GMK)
handles some CA tasks such as processing certificate requests and authenticating users.
Nonce
handles some CA tasks such as processing certificate requests and authenticating users.
Registration authority (RA)
handles some CA tasks such as processing certificate requests and authenticating users.
PAP
handles some CA tasks such as processing certificate requests and authenticating users.
Kerberos
handles some CA tasks such as processing certificate requests and authenticating users.
MS-CHAP
handles some CA tasks such as processing certificate requests and authenticating users.
Password
handles some CA tasks such as processing certificate requests and authenticating users.
EAP
handles some CA tasks such as processing certificate requests and authenticating users.
Digital certificates
handles some CA tasks such as processing certificate requests and authenticating users.
Group master key (GMK)
management protocol that controls port-based authentication.
Nonce
management protocol that controls port-based authentication.
Registration authority (RA)
management protocol that controls port-based authentication.
PAP
management protocol that controls port-based authentication.
Kerberos
management protocol that controls port-based authentication.
MS-CHAP
management protocol that controls port-based authentication.
Password
management protocol that controls port-based authentication.
EAP
management protocol that controls port-based authentication.
Digital certificates
management protocol that controls port-based authentication.
Group master key (GMK)
starting point of the group key hierarchy.
Nonce
starting point of the group key hierarchy.
Registration authority (RA)
starting point of the group key hierarchy.
PAP
starting point of the group key hierarchy.
Kerberos
starting point of the group key hierarchy.
MS-CHAP
starting point of the group key hierarchy.
Password
starting point of the group key hierarchy.
EAP
starting point of the group key hierarchy.
Digital certificates
starting point of the group key hierarchy.
Group master key (GMK)
authentication system developed by the Massachusetts Institute of Technology (MIT).
Nonce
authentication system developed by the Massachusetts Institute of Technology (MIT).
Registration authority (RA)
authentication system developed by the Massachusetts Institute of Technology (MIT).
PAP
authentication system developed by the Massachusetts Institute of Technology (MIT).
Kerberos
authentication system developed by the Massachusetts Institute of Technology (MIT).
MS-CHAP
authentication system developed by the Massachusetts Institute of Technology (MIT).
Password
authentication system developed by the Massachusetts Institute of Technology (MIT).
EAP
authentication system developed by the Massachusetts Institute of Technology (MIT).
Digital certificates
authentication system developed by the Massachusetts Institute of Technology (MIT).
Group master key (GMK)
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Secure Wireless Authentication
1
The system of using digital certificates,CAs,and other registration authorities that verify and authenticate the validity of each party involved in a transaction over a public network is known as ____.

A) AAA server
B) AAA infrastructure
C) public cryptography
D) public key infrastructure (PKI)
D
2
A ____ deployment uses local authentication with one or more RADIUS servers at each site. However, the authentication database is replicated from one central site to each local site.

A) distributed autonomous site
B) distributed sites with centralized authentication and security
C) single site deployment
D) distributed sites and security with centralized authentication
A
3
____ measures the resources a user consumes during each network session.

A) Accounting
B) Authorization
C) Authentication
D) Integrity
A
4
LEAP is not vulnerable to dictionary attack tools.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
The X.500 standard defines a protocol for a client application to access an X.500 directory called the ____.

A) DAP
B) DIB
C) DIT
D) DIU
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Wireless authentication first requires the wireless device-not the user-to be authenticated before being connected to the WLAN.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
If authentication is performed by IEEE 802.1x using the WPA or WPA2 Enterprise model, the distribution of the ____, from which all other keys are formed, is done by the authentication server.

A) pairwise master key (PMK)
B) master key (MK)
C) pairwise transient key (PTK)
D) key confirmation key (KCK)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ is an industry standard protocol specification that forwards username and password information to a centralized server.

A) Kerberos
B) TACACS+
C) PKI
D) Asymmetric encryption
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
With ____ deployment, RADIUS servers are located at each site to perform authentication. However, instead of the authentication database being replicated to each site, it is centrally located.

A) distributed autonomous site
B) distributed sites with centralized authentication and security
C) single site deployment
D) distributed sites and security with centralized authentication
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The MKs are used for access point to wireless device transmissions, or unicast transmissions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ allows a RADIUS server to authenticate wireless devices stations by verifying a hash known as MD5 of each user's password.

A) PAP
B) CHAP
C) MS-CHAP
D) EAP-MD5
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ uses the unique human characteristics of a person for authentication (something the user is).

A) Digital certificates
B) Passwords
C) Biometrics
D) Password tokens
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
____ deployment consists of one or more RADIUS servers accessing a centralized authentication database.

A) Distributed autonomous sites
B) Distributed sites with centralized authentication and security
C) Single site
D) Distributed sites and security with centralized authentication
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
LDAP was developed by Microsoft and the University of Michigan in 1996.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
EAP was originally defined for dial-up access but is now used for both wired and wireless access.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Several of the EAP protocols use ____, which creates a ciphertext from cleartext.

A) symmetric encryption
B) hashing
C) asymmetric encryption
D) filtering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
In public key cryptography, the ____ key encrypts the message.

A) public
B) private
C) known
D) user
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
____ requires that the wireless device and RADIUS server prove their identities to each other by using public key cryptography such as digital certificates.

A) PAP
B) LEAP
C) EAP-TLS
D) EAP-MD5
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
The International Organization for Standardization (ISO) created a standard for directory services known as ____.

A) ISO.500
B) LDAP-1000
C) X.500
D) Z.101
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
A ____ is a database stored on the network that contains information about users and network devices.

A) PKI
B) biometric service
C) Kerberos service
D) directory service
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
The ____ is used by the EAP key exchanges to provide confidentiality.

A) KEK
B) KCK
C) WPAK
D) nonce key
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
The ____________________ is used by the EAP key exchanges to provide data origin authenticity.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
The purpose of the ____ handshake is to authenticate the GTK.

A) group key
B) four-way
C) five-way
D) MK
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
The management protocol of IEEE 802.1x that governs the interaction between the wireless device, access point, and RADIUS server is known as the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
What are the primary differences between LDAP and DAP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
What are the two types of device authentication supported by the IEEE 802.11 standard?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Entries in the DIB are arranged in a tree structure called the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Access points and wireless devices must exchange information in order to create and acknowledge the MKs and the GKs. This exchange of information is known as ____.

A) WPA exchange
B) GK encryption
C) handshakes
D) MK exchange
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
How does Kerberos work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
____________________ is the process that determines whether the user has the authority to carry out certain tasks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
The exchange of information for the MK is based on a ____.

A) group key handshake
B) PTK handshake
C) GTK encryption
D) four-way handshake
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
When an AP sends the same packet to all wireless devices, known as a broadcast, MKs are not used. Instead, ____ are used.

A) temporal keys
B) group keys (GK)
C) key confirmation keys (KEKs)
D) pairwise master keys (PMKs)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Identify the types of information typically included in a digital certificate.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Briefly describe the functions of a RADIUS client and a RADIUS server.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are the advantages and disadvantages of distributed autonomous site deployment?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
What are the advantages and disadvantages of distributed sites with centralized authentication and security deployment?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Certificates are issued by a trusted third party called a(n) ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What is authentication for a wired network?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
The ____ is the value that the wireless devices use to decrypt broadcast messages from APs.

A) GTK
B) MK
C) PTK
D) PMK
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are the steps for creating a pairwise master key (PMK)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Describe the main characteristics of the Challenge-Handshake Authentication Protocol (CHAP).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Nonce
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Registration authority (RA)
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
PAP
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Kerberos
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
MS-CHAP
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Password
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
EAP
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Digital certificates
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
Group master key (GMK)
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Nonce
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Registration authority (RA)
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
PAP
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Kerberos
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
MS-CHAP
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Password
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
EAP
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Digital certificates
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Group master key (GMK)
Microsoft implementation of CHAP.
Nonce
Microsoft implementation of CHAP.
Registration authority (RA)
Microsoft implementation of CHAP.
PAP
Microsoft implementation of CHAP.
Kerberos
Microsoft implementation of CHAP.
MS-CHAP
Microsoft implementation of CHAP.
Password
Microsoft implementation of CHAP.
EAP
Microsoft implementation of CHAP.
Digital certificates
Microsoft implementation of CHAP.
Group master key (GMK)
electronic files that the user has and are used to uniquely identify users and resources over networks.
Nonce
electronic files that the user has and are used to uniquely identify users and resources over networks.
Registration authority (RA)
electronic files that the user has and are used to uniquely identify users and resources over networks.
PAP
electronic files that the user has and are used to uniquely identify users and resources over networks.
Kerberos
electronic files that the user has and are used to uniquely identify users and resources over networks.
MS-CHAP
electronic files that the user has and are used to uniquely identify users and resources over networks.
Password
electronic files that the user has and are used to uniquely identify users and resources over networks.
EAP
electronic files that the user has and are used to uniquely identify users and resources over networks.
Digital certificates
electronic files that the user has and are used to uniquely identify users and resources over networks.
Group master key (GMK)
a randomly chosen value.
Nonce
a randomly chosen value.
Registration authority (RA)
a randomly chosen value.
PAP
a randomly chosen value.
Kerberos
a randomly chosen value.
MS-CHAP
a randomly chosen value.
Password
a randomly chosen value.
EAP
a randomly chosen value.
Digital certificates
a randomly chosen value.
Group master key (GMK)
handles some CA tasks such as processing certificate requests and authenticating users.
Nonce
handles some CA tasks such as processing certificate requests and authenticating users.
Registration authority (RA)
handles some CA tasks such as processing certificate requests and authenticating users.
PAP
handles some CA tasks such as processing certificate requests and authenticating users.
Kerberos
handles some CA tasks such as processing certificate requests and authenticating users.
MS-CHAP
handles some CA tasks such as processing certificate requests and authenticating users.
Password
handles some CA tasks such as processing certificate requests and authenticating users.
EAP
handles some CA tasks such as processing certificate requests and authenticating users.
Digital certificates
handles some CA tasks such as processing certificate requests and authenticating users.
Group master key (GMK)
management protocol that controls port-based authentication.
Nonce
management protocol that controls port-based authentication.
Registration authority (RA)
management protocol that controls port-based authentication.
PAP
management protocol that controls port-based authentication.
Kerberos
management protocol that controls port-based authentication.
MS-CHAP
management protocol that controls port-based authentication.
Password
management protocol that controls port-based authentication.
EAP
management protocol that controls port-based authentication.
Digital certificates
management protocol that controls port-based authentication.
Group master key (GMK)
starting point of the group key hierarchy.
Nonce
starting point of the group key hierarchy.
Registration authority (RA)
starting point of the group key hierarchy.
PAP
starting point of the group key hierarchy.
Kerberos
starting point of the group key hierarchy.
MS-CHAP
starting point of the group key hierarchy.
Password
starting point of the group key hierarchy.
EAP
starting point of the group key hierarchy.
Digital certificates
starting point of the group key hierarchy.
Group master key (GMK)
authentication system developed by the Massachusetts Institute of Technology (MIT).
Nonce
authentication system developed by the Massachusetts Institute of Technology (MIT).
Registration authority (RA)
authentication system developed by the Massachusetts Institute of Technology (MIT).
PAP
authentication system developed by the Massachusetts Institute of Technology (MIT).
Kerberos
authentication system developed by the Massachusetts Institute of Technology (MIT).
MS-CHAP
authentication system developed by the Massachusetts Institute of Technology (MIT).
Password
authentication system developed by the Massachusetts Institute of Technology (MIT).
EAP
authentication system developed by the Massachusetts Institute of Technology (MIT).
Digital certificates
authentication system developed by the Massachusetts Institute of Technology (MIT).
Group master key (GMK)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.