Match each item with an statement below:
A. a randomly chosen value.
B. handles some CA tasks such as processing certificate requests and authenticating users.
C. basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
D. authentication system developed by the Massachusetts Institute of Technology (MIT).
E. Microsoft implementation of CHAP.
F. secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
G. management protocol that controls port-based authentication.
H. electronic files that the user has and are used to uniquely identify users and resources over networks.
I. starting point of the group key hierarchy.
A. Nonce
B. Registration authority (RA)
C. PAP
D. Kerberos
E. MS-CHAP
F. Password
G. EAP
H. Digital certificates
I. Group master key (GMK)
You might also like to view...
Suppose there are four radio button controls attached to a group box control on a form. How many radio buttons can be selected (that is, be “on”) at any given time?
(A) 2 (B) 1 (C) 3 (D) 4
What type of array is a character string?
What will be an ideal response?
________ is a representation of a fact, a figure, or an idea and can be a number, a word, a picture, or even a recording of sound
Fill in the blank(s) with correct word
All new pages in a document ____.
A. have a blank master until one is chosen B. have the A-Master applied to them by default C. must have the A-Master applied to them until they are saved D. none of the above