COMPUTER SOFTWARE
OPERATING SYSTEMS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
CHIP
|
|
CHOP
|
|
CHEP
|
|
CHAP
|
Detailed explanation-1: -Password Authentication Protocol, or PAP, and Challenge Handshake Authentication Protocol, or CHAP, are both used to authenticate PPP sessions and can be used with many VPNs. PAP works like a standard login procedure. The remote system authenticates itself by using a static username and password combination.
Detailed explanation-2: -CHAP is based on a shared secret, but in order to authenticate, the authenticator sends a “challenge” message to the access-requesting party, which responds with a value calculated using a “one-way hash” function that takes as inputs the challenge and the shared secret.
Detailed explanation-3: -Active Directory authentication (user-based) Mutual authentication (certificate-based) Single sign-on (SAML-based federated authentication) (user-based)