Describe the handshake interaction between a CHAP initiator and an authenticator.
What will be an ideal response?
CHAP relies on hashes based on a shared secret, usually a password that both ends of the connection know. When the initiator of the connection makes the initial connection request, the authenticator creates some form of challenge message. The initiator then makes a hash using the password and sends that to the authenticator. The authenticator, in turn, compares that value to its own hash calculation based on the password. If they match, the initiator is authenticated.
You might also like to view...
Java provides a(n) "____" class for each primitive type.
A. interface B. abstract C. private D. wrapper
When a domain is combined with a host name and a top-level domain, a(n) ________ is formed.
a) FQDN b) TLD c) WWW d) ASP e) None of the above.
The utility included with Windows 8 for managing files is called _____.
A. Windows Explorer B. File Utility C. File Manager D. File Explorer
A named collection of formatting characteristics that can be applied to characters or paragraphs.
What will be an ideal response?