CHAP provides a secure authentication routine by having both ends of the authentication process perform a(n) _______________ on a shared secret, and having the initiator send the result of this rather than a cleartext password.

Fill in the blank(s) with the appropriate word(s).


hash

correct

Computer Science & Information Technology

You might also like to view...

Which of the following is false?

a. Java SE 9 adds new static convenience factory methods to interfaces List, Set and Map that enable you to create small mutable collections. b. The collections returned by the convenience factory methods are not allowed to contain null values—these methods throw a NullPointerException if any argument is null. c. The iteration order is unspecified for Sets returned by the convenience factory methods. d. All of the above are true.

Computer Science & Information Technology

A(n) ____ allows you to capture video images using your computer.

A. Web cam B. digital media player C. digital camera D. All of the above.

Computer Science & Information Technology

Excel tables can be sorted in ascending or descending order

Indicate whether the statement is true or false

Computer Science & Information Technology

A user needs to remove potentially-damaging comments from a Microsoft Word document. Which of the following is the best way to do this?

a. Use Remove Metadata. b. Copy text of entire document into a new document. c. Save document as plain text. d. Use Document Inspector.

Computer Science & Information Technology