Matching
Match each item with an statement below:
Premises:
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Microsoft implementation of CHAP.
electronic files that the user has and are used to uniquely identify users and resources over networks.
a randomly chosen value.
handles some CA tasks such as processing certificate requests and authenticating users.
management protocol that controls port-based authentication.
starting point of the group key hierarchy.
authentication system developed by the Massachusetts Institute of Technology (MIT).
Responses:
Password
EAP
MS-CHAP
PAP
Group master key (GMK)
Digital certificates
Nonce
Kerberos
Registration authority (RA)
Correct Answer:
Premises:
Responses:
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Microsoft implementation of CHAP.
electronic files that the user has and are used to uniquely identify users and resources over networks.
a randomly chosen value.
handles some CA tasks such as processing certificate requests and authenticating users.
management protocol that controls port-based authentication.
starting point of the group key hierarchy.
authentication system developed by the Massachusetts Institute of Technology (MIT).
Premises:
secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
Microsoft implementation of CHAP.
electronic files that the user has and are used to uniquely identify users and resources over networks.
a randomly chosen value.
handles some CA tasks such as processing certificate requests and authenticating users.
management protocol that controls port-based authentication.
starting point of the group key hierarchy.
authentication system developed by the Massachusetts Institute of Technology (MIT).
Responses:
Related Questions
Q1: The _ is used by the EAP
Q2: _ allows a RADIUS server to authenticate
Q3: Identify the types of information typically included
Q4: A _ deployment uses local authentication with
Q6: The exchange of information for the MK
Q7: The _ is used by the EAP
Q8: _ is the process that determines whether
Q9: _ requires that the wireless device and
Q10: Entries in the DIB are arranged in
Q11: What are the advantages and disadvantages of