Match each item with an statement below:

A. a randomly chosen value.
B. handles some CA tasks such as processing certificate requests and authenticating users.
C. basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
D. authentication system developed by the Massachusetts Institute of Technology (MIT).
E. Microsoft implementation of CHAP.
F. secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
G. management protocol that controls port-based authentication.
H. electronic files that the user has and are used to uniquely identify users and resources over networks.
I. starting point of the group key hierarchy.


A. Nonce
B. Registration authority (RA)
C. PAP
D. Kerberos
E. MS-CHAP
F. Password
G. EAP
H. Digital certificates
I. Group master key (GMK)

Computer Science & Information Technology

You might also like to view...

Suppose there are four radio button controls attached to a group box control on a form. How many radio buttons can be selected (that is, be “on”) at any given time?

(A) 2 (B) 1 (C) 3 (D) 4

Computer Science & Information Technology

What type of array is a character string?

What will be an ideal response?

Computer Science & Information Technology

________ is a representation of a fact, a figure, or an idea and can be a number, a word, a picture, or even a recording of sound

Fill in the blank(s) with correct word

Computer Science & Information Technology

All new pages in a document ____.

A. have a blank master until one is chosen B. have the A-Master applied to them by default C. must have the A-Master applied to them until they are saved D. none of the above

Computer Science & Information Technology