COMPUTER FUNDAMENTALS

COMPUTER SOFTWARE

OPERATING SYSTEMS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What protocol can be used for authentication on a VPN connection?
A
CHIP
B
CHOP
C
CHEP
D
CHAP
Explanation: 

Detailed explanation-1: -Password Authentication Protocol, or PAP, and Challenge Handshake Authentication Protocol, or CHAP, are both used to authenticate PPP sessions and can be used with many VPNs. PAP works like a standard login procedure. The remote system authenticates itself by using a static username and password combination.

Detailed explanation-2: -CHAP is based on a shared secret, but in order to authenticate, the authenticator sends a “challenge” message to the access-requesting party, which responds with a value calculated using a “one-way hash” function that takes as inputs the challenge and the shared secret.

Detailed explanation-3: -Active Directory authentication (user-based) Mutual authentication (certificate-based) Single sign-on (SAML-based federated authentication) (user-based)

There is 1 question to complete.