When using CHAP which of the following is the first step in the process?

A. The remote node responds with a value calculated using an MD5 hash salted with the password
B. The local router sends a challenge message to the remote router
C. The local router verifies the hash value
D. The local router sends its password


B
Explanation: Password Authentication Protocol (PAP) passes the credential in clear text. A better alternative is Challenge-Handshake Authentication Protocol (CHAP), which never passes the credentials across the network. The CHAP process is as follows:
1. The local router sends a challenge message to the remote router
2. The remote node responds with a value calculated using an MD5 hash salted with the password
3. The local router verifies the hash value with same password, thus ensuring the remote router knows the password without sending the password

Computer Science & Information Technology

You might also like to view...

You have two processors on a computer running Client Hyper-V. You have two virtual machines running, VM1 and VM2. You want to be sure VM1 is allocated twice as much processing power as VM2. What control setting should you configure?

A. Relative weight B. Virtual machine reserve C. Virtual machine limit D. Percent of total system resources

Computer Science & Information Technology

Which of the following widths is the largest?

A. column width B. child container width C. parent container width D. content width

Computer Science & Information Technology

Structure members can be passed to a function in the same manner as any ____________________ variable.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A __________ is an example of something to monitor.

A. heater B. temperature C. voltage D. valve

Computer Science & Information Technology