Match each item with an statement below:
A. a randomly chosen value.
B. handles some CA tasks such as processing certificate requests and authenticating users.
C. basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
D. authentication system developed by the Massachusetts Institute of Technology (MIT).
E. Microsoft implementation of CHAP.
F. secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
G. management protocol that controls port-based authentication.
H. electronic files that the user has and are used to uniquely identify users and resources over networks.
I. starting point of the group key hierarchy.
A. Nonce
B. Registration authority (RA)
C. PAP
D. Kerberos
E. MS-CHAP
F. Password
G. EAP
H. Digital certificates
I. Group master key (GMK)
You might also like to view...
What do you place in front of the scope operator(::) in the implementation of a template class called someThing?
What will be an ideal response?
A ____ is a collection of Web pages that are linked logically, and located together on a hosting computer.
a. site map b. Web site c. Web gallery d. Web portfolio
A common control which displays the values in a field is called a(n) ________ Box control.
Fill in the blank(s) with the appropriate word(s).
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites??
A. ?VPN proxy B. ?VPN server C. ?VPN transport D. ?VPN gateway