Describe the main characteristics of the Challenge-Handshake Authentication Protocol (CHAP).

What will be an ideal response?


The foundation of CHAP is a three-way handshake, which is accomplished during the initial authentication and may be repeated any time after the link has been established. Both the device and the authenticator share a secret key. The authenticator sends a "challenge" message to the device, which responds with a value calculated using a one-way hash function. The authenticator then compares that response against its own calculation of the expected hash value. If the values match, the authentication is acknowledged.

Computer Science & Information Technology

You might also like to view...

When you open the button symbol edit window, Flash places the instance in the ____ frame.

A. Over B. Hit C. Up D. Down

Computer Science & Information Technology

What happens when you drag an app's title bar to the bottom of the screen and release the mouse button?

A) it maximizes B) it resizes C) it minimizes D) it closes

Computer Science & Information Technology

Security policies and procedures should be static.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Match each item with the correct statement below.

A. B. A file that contains the variables to be merged with the main document is the _____. C. D. E. Contains the text and graphics that remain the same for each version of the merged document. F. Inserted as placeholders at the place where the name, address, and other data will appear in a form letter. G. All the variables for one individual are called a(n) ______. H.

Computer Science & Information Technology