A user enters a password into a logon box on a PC. The server and the PC then compare one-way hashes to validate the password. Which of the following methods uses this process?
A. PKI
B. Kerberos
C. Single sign-on
D. CHAP
Answer: D. CHAP
You might also like to view...
What happens if you select a file in the Local Site window and click the Get button?
What will be an ideal response?
Which of the following is a key benefit of using JDBC?
a. It is a simple-to-use database management system. b. Allows developers to change the underlying database without modifying the Java code. c. It is a multi-platform database management system. d. It provides a GUI for database management systems.
Review your answer to Exercise 14.16. Why might a C++ program use the statement
``` Array< Employee > workerList; ``` What will be an ideal response?
Match the following types of ports with their description:
I. Serial II. Parallel III. USB IV. FireWire V. Ethernet A. Used for network access. B. Used to transfer huge amounts of data like pictures and video. C. Used to send data faster and has all but replaced serial and parallel ports. D. Used to send data in groups of bits. E. Used to send data one bit at a time.